U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-39476 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with small possibility, the root cause is exactly the same as commit bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"") However, Dan reported another hang after that, and junxiao investigated the problem and found out that this is caused by plugged bio can't issue from raid5d(). Current implementation in raid5d() has a weird dependence: 1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear MD_SB_CHANGE_PENDING; 2) raid5d() handles IO in a deadloop, until all IO are issued; 3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared; This behaviour is introduce before v2.6, and for consequence, if other context hold 'reconfig_mutex', and md_check_recovery() can't update super_block, then raid5d() will waste one cpu 100% by the deadloop, until 'reconfig_mutex' is released. Refer to the implementation from raid1 and raid10, fix this problem by skipping issue IO if MD_SB_CHANGE_PENDING is still set after md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex' is released. Meanwhile, the hang problem will be fixed as well.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/098d54934814dd876963abfe751c3b1cf7fbe56a Mailing List  Patch 
https://git.kernel.org/stable/c/098d54934814dd876963abfe751c3b1cf7fbe56a Mailing List  Patch 
https://git.kernel.org/stable/c/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa Mailing List  Patch 
https://git.kernel.org/stable/c/151f66bb618d1fd0eeb84acb61b4a9fa5d8bb0fa Mailing List  Patch 
https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b Mailing List  Patch 
https://git.kernel.org/stable/c/3f8d5e802d4cedd445f9a89be8c3fd2d0e99024b Mailing List  Patch 
https://git.kernel.org/stable/c/634ba3c97ec413cb10681c7b196db43ee461ecf4 Mailing List  Patch 
https://git.kernel.org/stable/c/634ba3c97ec413cb10681c7b196db43ee461ecf4 Mailing List  Patch 
https://git.kernel.org/stable/c/aa64464c8f4d2ab92f6d0b959a1e0767b829d787 Mailing List  Patch 
https://git.kernel.org/stable/c/aa64464c8f4d2ab92f6d0b959a1e0767b829d787 Mailing List  Patch 
https://git.kernel.org/stable/c/b32aa95843cac6b12c2c014d40fca18aef24a347 Mailing List  Patch 
https://git.kernel.org/stable/c/b32aa95843cac6b12c2c014d40fca18aef24a347 Mailing List  Patch 
https://git.kernel.org/stable/c/cd2538e5af495b3c747e503db346470fc1ffc447 Mailing List  Patch 
https://git.kernel.org/stable/c/cd2538e5af495b3c747e503db346470fc1ffc447 Mailing List  Patch 
https://git.kernel.org/stable/c/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7 Mailing List  Patch 
https://git.kernel.org/stable/c/e332a12f65d8fed8cf63bedb4e9317bb872b9ac7 Mailing List  Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-667 Improper Locking cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-39476
NVD Published Date:
07/05/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org