CVE-2024-35956

Source
https://cve.org/CVERecord?id=CVE-2024-35956
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35956.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35956
Downstream
Related
Published
2024-05-20T09:41:49.261Z
Modified
2026-03-14T12:34:05.546293Z
Summary
btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations
Details

In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations

Create subvolume, create snapshot and delete subvolume all use btrfssubvolumereservemetadata() to reserve metadata for the changes done to the parent subvolume's fs tree, which cannot be mediated in the normal way via starttransaction. When quota groups (squota or qgroups) are enabled, this reserves qgroup metadata of type PREALLOC. Once the operation is associated to a transaction, we convert PREALLOC to PERTRANS, which gets cleared in bulk at the end of the transaction.

However, the error paths of these three operations were not implementing this lifecycle correctly. They unconditionally converted the PREALLOC to PERTRANS in a generic cleanup step regardless of errors or whether the operation was fully associated to a transaction or not. This resulted in error paths occasionally converting this rsv to PERTRANS without calling recordrootintrans successfully, which meant that unless that root got recorded in the transaction by some other thread, the end of the transaction would not free that root's PERTRANS, leaking it. Ultimately, this resulted in hitting a WARN in CONFIGBTRFS_DEBUG builds at unmount for the leaked reservation.

The fix is to ensure that every qgroup PREALLOC reservation observes the following properties:

  1. any failure before recordrootin_trans is called successfully results in freeing the PREALLOC reservation.
  2. after recordrootin_trans, we convert to PERTRANS, and now the transaction owns freeing the reservation.

This patch enforces those properties on the three operations. Without it, generic/269 with squotas enabled at mkfs time would fail in ~5-10 runs on my system. With this patch, it ran successfully 1000 times in a row.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35956.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e85fde5162bf1b242cbd6daf7dba0f9b457d592b
Fixed
945559be6e282a812dc48f7bcd5adc60901ea4a0
Fixed
14431815a4ae4bcd7c7a68b6a64c66c7712d27c9
Fixed
6c95336f5d8eb9ab79cd7306d71b6d0477363f8c
Fixed
74e97958121aa1f5854da6effba70143f051b0cd
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2978cb474745b2d93c263008d265e89985706094

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35956.json"