APPLIED: [SRU][J][PATCH 0/1] CVE-2024-53090

Stefan Bader stefan.bader at canonical.com
Fri Oct 24 14:02:00 UTC 2025


On 20/10/2025 10:15, Alessio Faina wrote:
> https://ubuntu.com/security/CVE-2024-53090
> 
> [ Impact ]
> 
> afs: Fix lock recursion
> afs_wake_up_async_call() can incur lock recursion.  The problem is that it
> is called from AF_RXRPC whilst holding the ->notify_lock, but it tries to
> take a ref on the afs_call struct in order to pass it to a work queue - but
> if the afs_call is already queued, we then have an extraneous ref that must
> be put... calling afs_put_call() may call back down into AF_RXRPC through
> rxrpc_kernel_shutdown_call(), however, which might try taking the
> ->notify_lock again.
> 
> This case isn't very common, however, so defer it to a workqueue.  The oops
> looks something like:
> 
>    BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646
>     lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0
>    CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351
>    Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014
>    Call Trace:
>     <TASK>
>     dump_stack_lvl+0x47/0x70
>     do_raw_spin_lock+0x3c/0x90
>     rxrpc_kernel_shutdown_call+0x83/0xb0
>     afs_put_call+0xd7/0x180
>     rxrpc_notify_socket+0xa0/0x190
>     rxrpc_input_split_jumbo+0x198/0x1d0
>     rxrpc_input_data+0x14b/0x1e0
>     ? rxrpc_input_call_packet+0xc2/0x1f0
>     rxrpc_input_call_event+0xad/0x6b0
>     rxrpc_input_packet_on_conn+0x1e1/0x210
>     rxrpc_input_packet+0x3f2/0x4d0
>     rxrpc_io_thread+0x243/0x410
>     ? __pfx_rxrpc_io_thread+0x10/0x10
>     kthread+0xcf/0xe0
>     ? __pfx_kthread+0x10/0x10
>     ret_from_fork+0x24/0x40
>     ? __pfx_kthread+0x10/0x10
>     ret_from_fork_asm+0x1a/0x30
>     </TASK>
> 
> [ Fix ]
> 
> Backport the following commit from upstream:
>   - 610a79ffea02102899a1373fe226d949944a7ed6: "afs: Fix lock recursion"
> 
> Plucky:   Not affected
> Noble:    Not affected
> Jammy:    Backported from upstream
> Focal:    Fixed separately
> Bionic:   Fixed separately
> Xenial:   Not affected
> Trusty:   Not affected
> 
> [ Test Plan ]
> 
> Compile and boot tested only.
> 
> [ Regression Potential ]
> 
> The CVE patch was taking for granted some modifications to be present so
> some context changes were needed; the modificatins were not too
> important, the regression potential can be considered low.
> 
> 
> David Howells (1):
>    afs: Fix lock recursion
> 
>   fs/afs/internal.h |  2 ++
>   fs/afs/rxrpc.c    | 78 ++++++++++++++++++++++++++++++++++-------------
>   2 files changed, 58 insertions(+), 22 deletions(-)
> 


Applied to jammy:linux/master-next. Thanks.

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 48643 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251024/44646996/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251024/44646996/attachment-0001.sig>


More information about the kernel-team mailing list