๐Ÿ” CVE Alert

CVE-2024-50006

UNKNOWN 0.0

ext4: fix i_data_sem unlock order in ext4_ind_migrate()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate() Fuzzing reports a possible deadlock in jbd2_log_wait_commit. This issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require synchronous updates because the file descriptor is opened with O_SYNC. This can lead to the jbd2_journal_stop() function calling jbd2_might_wait_for_commit(), potentially causing a deadlock if the EXT4_IOC_MIGRATE call races with a write(2) system call. This problem only arises when CONFIG_PROVE_LOCKING is enabled. In this case, the jbd2_might_wait_for_commit macro locks jbd2_handle in the jbd2_journal_stop function while i_data_sem is locked. This triggers lockdep because the jbd2_journal_start function might also lock the same jbd2_handle simultaneously. Found by Linux Verification Center (linuxtesting.org) with syzkaller. Rule: add

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < 4192adefc9c570698821c5eb9873320eac2fcbf1 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < 3c46d6060d3e38de22196c1fe7706c5a3c696285 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < 53b1999cfd2c7addf2e581a32865fe8835467b44 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < ef05572da0c0eb89614ed01cc17d3c882bdbd1ff e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < 9fedf51ab8cf7b69bff08f37fe0989fec7f5d870 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < d43776b907659affef1de888525847d64b244194 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < 6252cb6bde7fc76cb8dcb49d1def7c326b190820 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < d58a00e981d3118b91d503da263e640b7cde6729 e8238f9a8339b3578c85e4192a7a23bc2bdc0333 < cc749e61c011c255d81b192a822db650c68b313f
Linux / Linux
3.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4192adefc9c570698821c5eb9873320eac2fcbf1 git.kernel.org: https://git.kernel.org/stable/c/3c46d6060d3e38de22196c1fe7706c5a3c696285 git.kernel.org: https://git.kernel.org/stable/c/53b1999cfd2c7addf2e581a32865fe8835467b44 git.kernel.org: https://git.kernel.org/stable/c/ef05572da0c0eb89614ed01cc17d3c882bdbd1ff git.kernel.org: https://git.kernel.org/stable/c/9fedf51ab8cf7b69bff08f37fe0989fec7f5d870 git.kernel.org: https://git.kernel.org/stable/c/d43776b907659affef1de888525847d64b244194 git.kernel.org: https://git.kernel.org/stable/c/6252cb6bde7fc76cb8dcb49d1def7c326b190820 git.kernel.org: https://git.kernel.org/stable/c/d58a00e981d3118b91d503da263e640b7cde6729 git.kernel.org: https://git.kernel.org/stable/c/cc749e61c011c255d81b192a822db650c68b313f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html