CVE-2024-27023

In the Linux kernel, the following vulnerability has been resolved: md: Fix missing release of 'active_io' for flush submit_flushes atomic_set(&mddev->flush_pending, 1); rdev_for_each_rcu(rdev, mddev) atomic_inc(&mddev->flush_pending); bi->bi_end_io = md_end_flush submit_bio(bi); /* flush io is done first */ md_end_flush if (atomic_dec_and_test(&mddev->flush_pending)) percpu_ref_put(&mddev->active_io) -> active_io is not released if (atomic_dec_and_test(&mddev->flush_pending)) -> missing release of active_io For consequence, mddev_suspend() will wait for 'active_io' to be zero forever. Fix this problem by releasing 'active_io' in submit_flushes() if 'flush_pending' is decreased to zero.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*

History

18 Sep 2025, 14:38

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a - () https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a - Patch
References () https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82 - () https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82 - Patch
References () https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f - () https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f - Patch
References () https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8 - () https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8 - Patch

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: md: Se corrigió la versión faltante de 'active_io' para descarga submit_flushes atomic_set(&mddev->flush_pending, 1); rdev_for_each_rcu(rdev, mddev) atomic_inc(&mddev->flush_pending); bi->bi_end_io = md_end_flush submit_bio(bi); /* purgar io se realiza primero */ md_end_flush if (atomic_dec_and_test(&mddev->flush_pending)) percpu_ref_put(&mddev->active_io) -> active_io no se publica si (atomic_dec_and_test(&mddev->flush_pending)) -> falta la versión de active_io para Como consecuencia, mddev_suspend() esperará a que 'active_io' sea cero para siempre. Solucione este problema liberando 'active_io' en submit_flushes() si 'flush_pending' se reduce a cero.
References () https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a - () https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a -
References () https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82 - () https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82 -
References () https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f - () https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f -
References () https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8 - () https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8 -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 14:38


NVD link : CVE-2024-27023

Mitre link : CVE-2024-27023

CVE.ORG link : CVE-2024-27023


JSON object : View

Products Affected

linux

  • linux_kernel