Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46734— btrfs: fix race between direct IO write and fsync when using same fd

EPSS 0.01% · P1

Affected Version Matrix 9

VendorProductVersion RangeStatus
LinuxLinux4e17707035a65f6e5b2a4d987a308cf8ed8c5ad1< d116a0b0e02f395cedfb8c725bd67480aa7c428caffected
6cae8d04d8b3d1ecfadcaa989e673f6f73349ed5< cd3087582e4fa36e89be4e6f859e75a4400292b4affected
0a108bde616a7017653385b5a12111015051a294< 7b5595f33c3c273613b590892a578d78186bb400affected
3831170f740685fddc8f6aa57a83ad0fef4711bf< 01681aa609b5f110502f56c4e3b2938efcf4a5bcaffected
939b656bc8ab203fdbde26ccac22bcb7f0985be5< cd9253c23aedd61eb5ff11f37a36247cd46faf86affected
5.15.165< 5.15.167affected
6.1.105< 6.1.110affected
6.6.46< 6.6.51affected
… +1 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-46734

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
btrfs: fix race between direct IO write and fsync when using same fd
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race between direct IO write and fsync when using same fd If we have 2 threads that are using the same file descriptor and one of them is doing direct IO writes while the other is doing fsync, we have a race where we can end up either: 1) Attempt a fsync without holding the inode's lock, triggering an assertion failures when assertions are enabled; 2) Do an invalid memory access from the fsync task because the file private points to memory allocated on stack by the direct IO task and it may be used by the fsync task after the stack was destroyed. The race happens like this: 1) A user space program opens a file descriptor with O_DIRECT; 2) The program spawns 2 threads using libpthread for example; 3) One of the threads uses the file descriptor to do direct IO writes, while the other calls fsync using the same file descriptor. 4) Call task A the thread doing direct IO writes and task B the thread doing fsyncs; 5) Task A does a direct IO write, and at btrfs_direct_write() sets the file's private to an on stack allocated private with the member 'fsync_skip_inode_lock' set to true; 6) Task B enters btrfs_sync_file() and sees that there's a private structure associated to the file which has 'fsync_skip_inode_lock' set to true, so it skips locking the inode's VFS lock; 7) Task A completes the direct IO write, and resets the file's private to NULL since it had no prior private and our private was stack allocated. Then it unlocks the inode's VFS lock; 8) Task B enters btrfs_get_ordered_extents_for_logging(), then the assertion that checks the inode's VFS lock is held fails, since task B never locked it and task A has already unlocked it. The stack trace produced is the following: assertion failed: inode_is_locked(&inode->vfs_inode), in fs/btrfs/ordered-data.c:983 ------------[ cut here ]------------ kernel BUG at fs/btrfs/ordered-data.c:983! Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 9 PID: 5072 Comm: worker Tainted: G U OE 6.10.5-1-default #1 openSUSE Tumbleweed 69f48d427608e1c09e60ea24c6c55e2ca1b049e8 Hardware name: Acer Predator PH315-52/Covini_CFS, BIOS V1.12 07/28/2020 RIP: 0010:btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs] Code: 50 d6 86 c0 e8 (...) RSP: 0018:ffff9e4a03dcfc78 EFLAGS: 00010246 RAX: 0000000000000054 RBX: ffff9078a9868e98 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff907dce4a7800 RDI: ffff907dce4a7800 RBP: ffff907805518800 R08: 0000000000000000 R09: ffff9e4a03dcfb38 R10: ffff9e4a03dcfb30 R11: 0000000000000003 R12: ffff907684ae7800 R13: 0000000000000001 R14: ffff90774646b600 R15: 0000000000000000 FS: 00007f04b96006c0(0000) GS:ffff907dce480000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f32acbfc000 CR3: 00000001fd4fa005 CR4: 00000000003726f0 Call Trace: <TASK> ? __die_body.cold+0x14/0x24 ? die+0x2e/0x50 ? do_trap+0xca/0x110 ? do_error_trap+0x6a/0x90 ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a] ? exc_invalid_op+0x50/0x70 ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a] ? asm_exc_invalid_op+0x1a/0x20 ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a] ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a] btrfs_sync_file+0x21a/0x4d0 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a] ? __seccomp_filter+0x31d/0x4f0 __x64_sys_fdatasync+0x4f/0x90 do_syscall_64+0x82/0x160 ? do_futex+0xcb/0x190 ? __x64_sys_futex+0x10e/0x1d0 ? switch_fpu_return+0x4f/0xd0 ? syscall_exit_to_user_mode+0x72/0x220 ? do_syscall_64+0x8e/0x160 ? syscall_exit_to_user_mod ---truncated---
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于使用相同 fd 时直接 IO 写入和 fsync 之间存在竞争。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 4e17707035a65f6e5b2a4d987a308cf8ed8c5ad1 ~ d116a0b0e02f395cedfb8c725bd67480aa7c428c -
LinuxLinux 5.15.165 ~ 5.15.167 -

II. Public POCs for CVE-2024-46734

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-46734

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-18 · 85 CVEs total

CVE-2024-46770ice: Add netif_device_attach/detach into PF reset flow
CVE-2024-46781nilfs2: fix missing cleanup on rollforward recovery error
CVE-2024-46768hwmon: (hp-wmi-sensors) Check if WMI event data exists
CVE-2024-46769spi: intel: Add check devm_kasprintf() returned value
CVE-2024-46767net: phy: Fix missing of_node_put() for leds
CVE-2024-46765ice: protect XDP configuration with a mutex
CVE-2024-46763fou: Fix null-ptr-deref in GRO.
CVE-2024-46762xen: privcmd: Fix possible access to a freed kirqfd instance
CVE-2024-46761pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
CVE-2024-46764bpf: add check for invalid name in btf_name_valid_section()
CVE-2024-46771can: bcm: Remove proc entry when dev is unregistered.
CVE-2024-46772drm/amd/display: Check denominator crb_pipes before used
CVE-2024-46773drm/amd/display: Check denominator pbn_div before used
CVE-2024-46774powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
CVE-2024-46775drm/amd/display: Validate function returns
CVE-2024-46776drm/amd/display: Run DC_LOG_DC after checking link->link_enc
CVE-2024-46777udf: Avoid excessive partition lengths
CVE-2024-46778drm/amd/display: Check UnboundedRequestEnabled's value
CVE-2024-46779drm/imagination: Free pvr_vm_gpuva after unlink
CVE-2024-46780nilfs2: protect references to superblock parameters exposed in sysfs

Showing top 20 of 85 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-46734

No comments yet


Leave a comment