Advisory Published
Updated

CVE-2024-56780: quota: flush quota_release_work upon quota writeback

First published: Wed Jan 08 2025(Updated: )

In the Linux kernel, the following vulnerability has been resolved: quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots() Since we currently don't always flush the quota_release_work queue in this path, we can end up with the following race: 1. dquot are added to releasing_dquots list during regular operations. 2. FS Freeze starts, however, this does not flush the quota_release_work queue. 3. Freeze completes. 4. Kernel eventually tries to flush the workqueue while FS is frozen which hits a WARN_ON since transaction gets started during frozen state: ext4_journal_check_start+0x28/0x110 [ext4] (unreliable) __ext4_journal_start_sb+0x64/0x1c0 [ext4] ext4_release_dquot+0x90/0x1d0 [ext4] quota_release_workfn+0x43c/0x4d0 Which is the following line: WARN_ON(sb->s_writers.frozen == SB_FREEZE_COMPLETE); Which ultimately results in generic/390 failing due to dmesg noise. This was detected on powerpc machine 15 cores. To avoid this, make sure to flush the workqueue during dquot_writeback_dquots() so we dont have any pending workitems after freeze.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel>=4.19.295<4.20
Linux Kernel>=5.4.257<5.4.287
Linux Kernel>=5.10.195<5.10.231
Linux Kernel>=5.15.132<5.15.174
Linux Kernel>=6.1.53<6.1.120
Linux Kernel>=6.4.16<6.5
Linux Kernel>=6.5.3<6.6.64
Linux Kernel>=6.7<6.12.4
Linux Kernel=6.13-rc1
debian/linux<=5.10.223-1
5.10.234-1
6.1.129-1
6.1.128-1
6.12.20-1
6.12.21-1
debian/linux-6.1
6.1.129-1~deb11u1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-56780?

    CVE-2024-56780 is categorized with a high severity rating due to its potential impact on system stability and security.

  • How do I fix CVE-2024-56780?

    To fix CVE-2024-56780, you should upgrade to a patched version of the Linux kernel that addresses this vulnerability.

  • What versions of Linux kernel are affected by CVE-2024-56780?

    CVE-2024-56780 affects multiple versions of the Linux kernel, specifically those between 4.19.295 and 4.20, and also various ranges starting from 5.4.257 to 6.12.4.

  • What type of vulnerability is CVE-2024-56780 classified as?

    CVE-2024-56780 is classified as a kernel vulnerability associated with the quota writeback functionality in the Linux kernel.

  • Is there any workaround for CVE-2024-56780 before applying the patch?

    Currently, there are no known workarounds for CVE-2024-56780, so upgrading to a secure version is essential.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203