In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix potential hang in nilfs_detach_log_writer()
Syzbot has reported a potential hang in nilfs_detach_log_writer() called
during nilfs2 unmount.
Analysis revealed that this is because nilfs_segctor_sync(), which
synchronizes with the log writer thread, can be called after
nilfs_segctor_destroy() terminates that thread, as shown in the call trace
below:
nilfs_detach_log_writer
nilfs_segctor_destroy
nilfs_segctor_kill_thread --> Shut down log writer thread
flush_work
nilfs_iput_work_func
nilfs_dispose_list
iput
nilfs_evict_inode
nilfs_transaction_commit
nilfs_construct_segment (if inode needs sync)
nilfs_segctor_sync --> Attempt to synchronize with
log writer thread
*** DEADLOCK ***
Fix this issue by changing nilfs_segctor_sync() so that the log writer
thread returns normally without synchronizing after it terminates, and by
forcing tasks that are already waiting to complete once after the thread
terminates.
The skipped inode metadata flushout will then be processed together in the
subsequent cleanup work in nilfs_segctor_destroy().
References
Configurations
Configuration 1 (hide)
|
History
01 Apr 2025, 18:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/06afce714d87c7cd1dcfccbcd800c5c5d2cf1cfd - Patch | |
References | () https://git.kernel.org/stable/c/1c3844c5f4eac043954ebf6403fa9fd1f0e9c1c0 - Patch | |
References | () https://git.kernel.org/stable/c/6e5c8e8e024e147b834f56f2115aad241433679b - Patch | |
References | () https://git.kernel.org/stable/c/911d38be151921a5d152bb55e81fd752384c6830 - Patch | |
References | () https://git.kernel.org/stable/c/a8799662fed1f8747edae87a1937549288baca6a - Patch | |
References | () https://git.kernel.org/stable/c/bc9cee50a4a4ca23bdc49f75ea8242d8a2193b3b - Patch | |
References | () https://git.kernel.org/stable/c/c516db6ab9eabbedbc430b4f93b0d8728e9b427f - Patch | |
References | () https://git.kernel.org/stable/c/eb85dace897c5986bc2f36b3c783c6abb8a4292e - Patch | |
References | () https://git.kernel.org/stable/c/eff7cdf890b02596b8d73e910bdbdd489175dbdb - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-667 | |
First Time |
Linux
Linux linux Kernel |
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/06afce714d87c7cd1dcfccbcd800c5c5d2cf1cfd - | |
References | () https://git.kernel.org/stable/c/1c3844c5f4eac043954ebf6403fa9fd1f0e9c1c0 - | |
References | () https://git.kernel.org/stable/c/6e5c8e8e024e147b834f56f2115aad241433679b - | |
References | () https://git.kernel.org/stable/c/911d38be151921a5d152bb55e81fd752384c6830 - | |
References | () https://git.kernel.org/stable/c/a8799662fed1f8747edae87a1937549288baca6a - | |
References | () https://git.kernel.org/stable/c/bc9cee50a4a4ca23bdc49f75ea8242d8a2193b3b - | |
References | () https://git.kernel.org/stable/c/c516db6ab9eabbedbc430b4f93b0d8728e9b427f - | |
References | () https://git.kernel.org/stable/c/eb85dace897c5986bc2f36b3c783c6abb8a4292e - | |
References | () https://git.kernel.org/stable/c/eff7cdf890b02596b8d73e910bdbdd489175dbdb - |
08 Nov 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
15 Jul 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 13:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jun 2024, 12:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-19 14:15
Updated : 2025-04-01 18:25
NVD link : CVE-2024-38582
Mitre link : CVE-2024-38582
CVE.ORG link : CVE-2024-38582
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking