๐Ÿ” CVE Alert

CVE-2024-50280

HIGH 7.8

dm cache: fix flushing uninitialized delayed_work on cache_ctr error

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: dm cache: fix flushing uninitialized delayed_work on cache_ctr error An unexpected WARN_ON from flush_work() may occur when cache creation fails, caused by destroying the uninitialized delayed_work waker in the error path of cache_create(). For example, the warning appears on the superblock checksum error. Reproduce steps: dmsetup create cmeta --table "0 8192 linear /dev/sdc 0" dmsetup create cdata --table "0 65536 linear /dev/sdc 8192" dmsetup create corig --table "0 524288 linear /dev/sdc 262144" dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \ /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0" Kernel logs: (snip) WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890 Fix by pulling out the cancel_delayed_work_sync() from the constructor's error path. This patch doesn't affect the use-after-free fix for concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix UAF in destroy()")) as cache_dtr is not changed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 19, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2b17026685a270b2beaf1cdd9857fcedd3505c7e < 40fac0271c7aedf60d81ed8214e80851e5b26312 d2a0b298ebf83ab6236f66788a3541e91ce75a70 < d154b333a5667b6c1b213a11a41ad7aaccd10c3d 6a3e412c2ab131c54945327a7676b006f000a209 < 5a754d3c771280f2d06bf8ab716d6a0d36ca256e 6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa < 8cc12dab635333c4ea28e72d7b947be7d0543c2c 6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa < aee3ecda73ce13af7c3e556383342b57e6bd0718 6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa < 135496c208ba26fd68cdef10b64ed7a91ac9a7ff 034cbc8d3b47a56acd89453c29632a9c117de09d 993406104d2b28fe470126a062ad37a1e21e792e 4d20032dd90664de09f2902a7ea49ae2f7771746 2f097dfac7579fd84ff98eb1d3acd41d53a485f3 6ac4f36910764cb510bafc4c3768544f86ca48ca
Linux / Linux
6.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/40fac0271c7aedf60d81ed8214e80851e5b26312 git.kernel.org: https://git.kernel.org/stable/c/d154b333a5667b6c1b213a11a41ad7aaccd10c3d git.kernel.org: https://git.kernel.org/stable/c/5a754d3c771280f2d06bf8ab716d6a0d36ca256e git.kernel.org: https://git.kernel.org/stable/c/8cc12dab635333c4ea28e72d7b947be7d0543c2c git.kernel.org: https://git.kernel.org/stable/c/aee3ecda73ce13af7c3e556383342b57e6bd0718 git.kernel.org: https://git.kernel.org/stable/c/135496c208ba26fd68cdef10b64ed7a91ac9a7ff lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html