๐Ÿ” CVE Alert

CVE-2024-53218

HIGH 7.8

f2fs: fix race in concurrent f2fs_stop_gc_thread

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix race in concurrent f2fs_stop_gc_thread In my test case, concurrent calls to f2fs shutdown report the following stack trace: Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85 Call Trace: <TASK> ? show_regs+0x8b/0xa0 ? __die_body+0x26/0xa0 ? die_addr+0x54/0x90 ? exc_general_protection+0x24b/0x5c0 ? asm_exc_general_protection+0x26/0x30 ? kthread_stop+0x46/0x390 f2fs_stop_gc_thread+0x6c/0x110 f2fs_do_shutdown+0x309/0x3a0 f2fs_ioc_shutdown+0x150/0x1c0 __f2fs_ioctl+0xffd/0x2ac0 f2fs_ioctl+0x76/0xe0 vfs_ioctl+0x23/0x60 __x64_sys_ioctl+0xce/0xf0 x64_sys_call+0x2b1b/0x4540 do_syscall_64+0xa7/0x240 entry_SYSCALL_64_after_hwframe+0x76/0x7e The root cause is a race condition in f2fs_stop_gc_thread() called from different f2fs shutdown paths: [CPU0] [CPU1] ---------------------- ----------------------- f2fs_stop_gc_thread f2fs_stop_gc_thread gc_th = sbi->gc_thread gc_th = sbi->gc_thread kfree(gc_th) sbi->gc_thread = NULL < gc_th != NULL > kthread_stop(gc_th->f2fs_gc_task) //UAF The commit c7f114d864ac ("f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()") attempted to fix this issue by using a read semaphore to prevent races between shutdown and remount threads, but it fails to prevent all race conditions. Fix it by converting to write lock of s_umount in f2fs_do_shutdown().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7950e9ac638e84518fbdd5c930939ad46a1068c5 < 794fa8792d4eacac191f1cbcc2e81b7369e4662a 7950e9ac638e84518fbdd5c930939ad46a1068c5 < 60457ed6c67625c87861f96912b4179dc2293896 7950e9ac638e84518fbdd5c930939ad46a1068c5 < c631207897a9b3d41167ceca58e07f8f94720e42 7950e9ac638e84518fbdd5c930939ad46a1068c5 < 7b0033dbc48340a1c1c3f12448ba17d6587ca092
Linux / Linux
4.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/794fa8792d4eacac191f1cbcc2e81b7369e4662a git.kernel.org: https://git.kernel.org/stable/c/60457ed6c67625c87861f96912b4179dc2293896 git.kernel.org: https://git.kernel.org/stable/c/c631207897a9b3d41167ceca58e07f8f94720e42 git.kernel.org: https://git.kernel.org/stable/c/7b0033dbc48340a1c1c3f12448ba17d6587ca092