CVE-2024-47660

Source
https://cve.org/CVERecord?id=CVE-2024-47660
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47660.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47660
Downstream
Related
Published
2024-10-09T14:02:54.884Z
Modified
2026-03-20T12:39:09.924661Z
Summary
fsnotify: clear PARENT_WATCHED flags lazily
Details

In the Linux kernel, the following vulnerability has been resolved:

fsnotify: clear PARENT_WATCHED flags lazily

In some setups directories can have many (usually negative) dentries. Hence __fsnotifyupdatechild_dentryflags() function can take a significant amount of time. Since the bulk of this function happens under inode->ilock this causes a significant contention on the lock when we remove the watch from the directory as the __fsnotifyupdatechilddentryflags() call from fsnotifyrecalcmask() races with __fsnotifyupdatechilddentryflags() calls from _fsnotifyparent() happening on children. This can lead upto softlockup reports reported by users.

Fix the problem by calling fsnotifyupdatechildrendentryflags() to set PARENT_WATCHED flags only when parent starts watching children.

When parent stops watching children, clear false positive PARENT_WATCHED flags lazily in _fsnotifyparent() for each accessed child.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47660.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
873feea09ebc980cbd3631b767356ce1eee65ec1
Fixed
3f3ef1d9f66b93913ce2171120d9226b55acd41d
Fixed
f9a48bc3dd9099935751458a5bbbea4b7c28abc8
Fixed
d8c42405fc3507cc43ba7e4986a773c3fc633f6e
Fixed
fc1b1e135c3f72382f792e6c319fc088d5523ad5
Fixed
7ef1d2e240c32b1f337a37232d037b07e3919e1a
Fixed
172e422ffea20a89bfdc672741c1aad6fbb5044e

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47660.json"