๐Ÿ” CVE Alert

CVE-2024-47679

UNKNOWN 0.0

vfs: fix race between evice_inodes() and find_inode()&iput()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: vfs: fix race between evice_inodes() and find_inode()&iput() Hi, all Recently I noticed a bug[1] in btrfs, after digged it into and I believe it'a race in vfs. Let's assume there's a inode (ie ino 261) with i_count 1 is called by iput(), and there's a concurrent thread calling generic_shutdown_super(). cpu0: cpu1: iput() // i_count is 1 ->spin_lock(inode) ->dec i_count to 0 ->iput_final() generic_shutdown_super() ->__inode_add_lru() ->evict_inodes() // cause some reason[2] ->if (atomic_read(inode->i_count)) continue; // return before // inode 261 passed the above check // list_lru_add_obj() // and then schedule out ->spin_unlock() // note here: the inode 261 // was still at sb list and hash list, // and I_FREEING|I_WILL_FREE was not been set btrfs_iget() // after some function calls ->find_inode() // found the above inode 261 ->spin_lock(inode) // check I_FREEING|I_WILL_FREE // and passed ->__iget() ->spin_unlock(inode) // schedule back ->spin_lock(inode) // check (I_NEW|I_FREEING|I_WILL_FREE) flags, // passed and set I_FREEING iput() ->spin_unlock(inode) ->spin_lock(inode) ->evict() // dec i_count to 0 ->iput_final() ->spin_unlock() ->evict() Now, we have two threads simultaneously evicting the same inode, which may trigger the BUG(inode->i_state & I_CLEAR) statement both within clear_inode() and iput(). To fix the bug, recheck the inode->i_count after holding i_lock. Because in the most scenarios, the first check is valid, and the overhead of spin_lock() can be reduced. If there is any misunderstanding, please let me know, thanks. [1]: https://lore.kernel.org/linux-btrfs/[email protected]/ [2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable() return false when I reproduced the bug.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
63997e98a3be68d7cec806d22bf9b02b2e1daabb < 6cc13a80a26e6b48f78c725c01b91987d61563ef 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 489faddb1ae75b0e1a741fe5ca2542a2b5e794a5 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 47a68c75052a660e4c37de41e321582ec9496195 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 3721a69403291e2514d13a7c3af50a006ea1153b 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 540fb13120c9eab3ef203f90c00c8e69f37449d1 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 0eed942bc65de1f93eca7bda51344290f9c573bb 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 6c857fb12b9137fee574443385d53914356bbe11 63997e98a3be68d7cec806d22bf9b02b2e1daabb < 88b1afbf0f6b221f6c5bb66cc80cd3b38d696687
Linux / Linux
2.6.37

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6cc13a80a26e6b48f78c725c01b91987d61563ef git.kernel.org: https://git.kernel.org/stable/c/489faddb1ae75b0e1a741fe5ca2542a2b5e794a5 git.kernel.org: https://git.kernel.org/stable/c/47a68c75052a660e4c37de41e321582ec9496195 git.kernel.org: https://git.kernel.org/stable/c/3721a69403291e2514d13a7c3af50a006ea1153b git.kernel.org: https://git.kernel.org/stable/c/540fb13120c9eab3ef203f90c00c8e69f37449d1 git.kernel.org: https://git.kernel.org/stable/c/0eed942bc65de1f93eca7bda51344290f9c573bb git.kernel.org: https://git.kernel.org/stable/c/0f8a5b6d0dafa4f533ac82e98f8b812073a7c9d1 git.kernel.org: https://git.kernel.org/stable/c/6c857fb12b9137fee574443385d53914356bbe11 git.kernel.org: https://git.kernel.org/stable/c/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html