CVE-2024-36882

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36882
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36882.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36882
Related
Published
2024-05-30T16:15:11Z
Modified
2024-09-18T03:26:23.678636Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

mm: use memallocnofssave() in pagecachera_order()

See commit f2c817bed58d ("mm: use memallocnofssave in readahead path"), ensure that pagecachera_order() do not attempt to reclaim file-backed pages too, or it leads to a deadlock, found issue when test ext4 large folio.

INFO: task DataXceiver for:7494 blocked for more than 120 seconds. "echo 0 > /proc/sys/kernel/hungtasktimeoutsecs" disables this message. task:DataXceiver for state:D stack:0 pid:7494 ppid:1 flags:0x00000200 Call trace: _switchto+0x14c/0x240 _schedule+0x82c/0xdd0 schedule+0x58/0xf0 ioschedule+0x24/0xa0 _foliolock+0x130/0x300 migratepagesbatch+0x378/0x918 migratepages+0x350/0x700 compactzone+0x63c/0xb38 compactzoneorder+0xc0/0x118 trytocompactpages+0xb0/0x280 _allocpagesdirectcompact+0x98/0x248 _allocpages+0x510/0x1110 allocpages+0x9c/0x130 folioalloc+0x20/0x78 filemapallocfolio+0x8c/0x1b0 pagecacheraorder+0x174/0x308 ondemandreadahead+0x1c8/0x2b8 pagecacheasyncra+0x68/0xb8 filemapreadahead.isra.0+0x64/0xa8 filemapgetpages+0x3fc/0x5b0 filemapspliceread+0xf4/0x280 ext4filespliceread+0x2c/0x48 [ext4] vfsspliceread.part.0+0xa8/0x118 splicedirecttoactor+0xbc/0x288 dosplicedirect+0x9c/0x108 dosendfile+0x328/0x468 _arm64syssendfile64+0x8c/0x148 invokesyscall+0x4c/0x118 el0svccommon.constprop.0+0xc8/0xf0 doel0svc+0x24/0x38 el0svc+0x4c/0x1f8 el0t64synchandler+0xc0/0xc8 el0t64_sync+0x188/0x190

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.94-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1
6.1.90-1
6.1.94-1~bpo11+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.8.11-1

Affected versions

6.*

6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1
6.1.55-1
6.1.64-1
6.1.66-1
6.1.67-1
6.1.69-1~bpo11+1
6.1.69-1
6.1.76-1~bpo11+1
6.1.76-1
6.1.82-1
6.1.85-1
6.1.90-1~bpo11+1
6.1.90-1
6.1.94-1~bpo11+1
6.1.94-1
6.1.98-1
6.1.99-1
6.1.106-1
6.1.106-2
6.1.106-3
6.3.1-1~exp1
6.3.2-1~exp1
6.3.4-1~exp1
6.3.5-1~exp1
6.3.7-1~bpo12+1
6.3.7-1
6.3.11-1
6.4~rc6-1~exp1
6.4~rc7-1~exp1
6.4.1-1~exp1
6.4.4-1~bpo12+1
6.4.4-1
6.4.4-2
6.4.4-3~bpo12+1
6.4.4-3
6.4.11-1
6.4.13-1
6.5~rc4-1~exp1
6.5~rc6-1~exp1
6.5~rc7-1~exp1
6.5.1-1~exp1
6.5.3-1~bpo12+1
6.5.3-1
6.5.6-1
6.5.8-1
6.5.10-1~bpo12+1
6.5.10-1
6.5.13-1
6.6.3-1~exp1
6.6.4-1~exp1
6.6.7-1~exp1
6.6.8-1
6.6.9-1
6.6.11-1
6.6.13-1~bpo12+1
6.6.13-1
6.6.15-1
6.6.15-2
6.7-1~exp1
6.7.1-1~exp1
6.7.4-1~exp1
6.7.7-1
6.7.9-1
6.7.9-2
6.7.12-1~bpo12+1
6.7.12-1
6.8.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}