
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a race condition vulnerability was discovered between ext4_write and ext4_convert_inline_data functions. The issue was reported by Hulk Robot and involves concurrent access to locks where ext4_convert_inline_data holds the xattr_sem lock while generic_perform_write holds the i_rwsem lock (Kernel Git).
The vulnerability manifests as a race condition that can trigger a BUG_ON condition in the kernel. The issue occurs because the lock held by ext4_convert_inline_data (xattr_sem) and the lock held by generic_perform_write (i_rwsem) can be concurrent. This leads to inconsistencies between block bitmap and bg descriptor, specifically showing "25 vs 31513 free clusters" error, and ultimately causes a kernel BUG at fs/ext4/ext4_jbd2.c:53 (Kernel Git).
When exploited, this vulnerability can cause a kernel panic through the BUG_ON condition, leading to system instability and potential denial of service. The issue affects the ext4 filesystem's handling of inline data conversion and write operations (Kernel Git).
The issue has been fixed by adding inode_lock() for ext4_convert_inline_data() and reorganizing the code flow. The fix moves ext4_convert_inline_data() in front of ext4_punch_hole() and removes similar handling from ext4_punch_hole(). This change was implemented in the kernel patch that fixes the race condition (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."