We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56759

btrfs: fix use-after-free when COWing tree bock and tracing is enabled



Description

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when COWing tree bock and tracing is enabled When a COWing a tree block, at btrfs_cow_block(), and we have the tracepoint trace_btrfs_cow_block() enabled and preemption is also enabled (CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent buffer while inside the tracepoint code. This is because in some paths that call btrfs_cow_block(), such as btrfs_search_slot(), we are holding the last reference on the extent buffer @buf so btrfs_force_cow_block() drops the last reference on the @buf extent buffer when it calls free_extent_buffer_stale(buf), which schedules the release of the extent buffer with RCU. This means that if we are on a kernel with preemption, the current task may be preempted before calling trace_btrfs_cow_block() and the extent buffer already released by the time trace_btrfs_cow_block() is called, resulting in a use-after-free. Fix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to btrfs_force_cow_block() before the COWed extent buffer is freed. This also has a side effect of invoking the tracepoint in the tree defrag code, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is called there, but this is fine and it was actually missing there.

Reserved 2024-12-29 | Published 2025-01-06 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ba5120a2fb5f23b4d39d302e181aa5d4e28a90d1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 526ff5b27f090fb15040471f892cd2c9899ce314
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 66376f1a73cba57fd0af2631d7888605b738e499
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 9a466b8693b9add05de99af00c7bdff8259ecf19
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c3a403d8ce36f5a809a492581de5ad17843e4701
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 44f52bbe96dfdbe4aca3818a2534520082a07040
affected

Default status
affected

5.10.233
unaffected

5.15.176
unaffected

6.1.124
unaffected

6.6.70
unaffected

6.12.8
unaffected

6.13
unaffected

References

git.kernel.org/...c/ba5120a2fb5f23b4d39d302e181aa5d4e28a90d1

git.kernel.org/...c/526ff5b27f090fb15040471f892cd2c9899ce314

git.kernel.org/...c/66376f1a73cba57fd0af2631d7888605b738e499

git.kernel.org/...c/9a466b8693b9add05de99af00c7bdff8259ecf19

git.kernel.org/...c/c3a403d8ce36f5a809a492581de5ad17843e4701

git.kernel.org/...c/44f52bbe96dfdbe4aca3818a2534520082a07040

cve.org (CVE-2024-56759)

nvd.nist.gov (CVE-2024-56759)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56759

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.