CVE-2024-47669

Source
https://cve.org/CVERecord?id=CVE-2024-47669
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47669.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47669
Downstream
Related
Published
2024-10-09T14:14:01.139Z
Modified
2026-03-11T07:52:18.143837Z
Summary
nilfs2: fix state management in error path of log writing function
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix state management in error path of log writing function

After commit a694291a6211 ("nilfs2: separate wait function from nilfssegctorwrite") was applied, the log writing function nilfssegctordo_construct() was able to issue I/O requests continuously even if user data blocks were split into multiple logs across segments, but two potential flaws were introduced in its error handling.

First, if nilfssegctorbeginconstruction() fails while creating the second or subsequent logs, the log writing function returns without calling nilfssegctorabortconstruction(), so the writeback flag set on pages/folios will remain uncleared. This causes page cache operations to hang waiting for the writeback flag. For example, truncateinodepagesfinal(), which is called via nilfsevict_inode() when an inode is evicted from memory, will hang.

Second, the NILFSICOLLECTED flag set on normal inodes remain uncleared. As a result, if the next log write involves checkpoint creation, that's fine, but if a partial log write is performed that does not, inodes with NILFSICOLLECTED set are erroneously removed from the "scdirtyfiles" list, and their data and b-tree blocks may not be written to the device, corrupting the block mapping.

Fix these issues by uniformly calling nilfssegctorabortconstruction() on failure of each step in the loop in nilfssegctordoconstruct(), having it clean up logs and segment usages according to progress, and correcting the conditions for calling nilfsredirtyinodes() to ensure that the NILFSICOLLECTED flag is cleared.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47669.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a694291a6211537189c6080f77f63cdabfc9b63e
Fixed
40a2757de2c376ef8a08d9ee9c81e77f3c750adf
Fixed
036441e8438b29111fa75008f0ce305fb4e83c0a
Fixed
efdde00d4a1ef10bb71e09ebc67823a3d3ad725b
Fixed
3e349d7191f0688fc9808ef24fd4e4b4ef5ca876
Fixed
30562eff4a6dd35c4b5be9699ef61ad9f5f20a06
Fixed
0a1a961bde4351dc047ffdeb2f1311ca16a700cc
Fixed
74866c16ea2183f52925fa5d76061a1fe7f7737b
Fixed
6576dd6695f2afca3f4954029ac4a64f82ba60ab

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47669.json"