{"id":"CVE-2024-56780","summary":"quota: flush quota_release_work upon quota writeback","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nquota: flush quota_release_work upon quota writeback\n\nOne of the paths quota writeback is called from is:\n\nfreeze_super()\n  sync_filesystem()\n    ext4_sync_fs()\n      dquot_writeback_dquots()\n\nSince we currently don't always flush the quota_release_work queue in\nthis path, we can end up with the following race:\n\n 1. dquot are added to releasing_dquots list during regular operations.\n 2. FS Freeze starts, however, this does not flush the quota_release_work queue.\n 3. Freeze completes.\n 4. Kernel eventually tries to flush the workqueue while FS is frozen which\n    hits a WARN_ON since transaction gets started during frozen state:\n\n  ext4_journal_check_start+0x28/0x110 [ext4] (unreliable)\n  __ext4_journal_start_sb+0x64/0x1c0 [ext4]\n  ext4_release_dquot+0x90/0x1d0 [ext4]\n  quota_release_workfn+0x43c/0x4d0\n\nWhich is the following line:\n\n  WARN_ON(sb-\u003es_writers.frozen == SB_FREEZE_COMPLETE);\n\nWhich ultimately results in generic/390 failing due to dmesg\nnoise. This was detected on powerpc machine 15 cores.\n\nTo avoid this, make sure to flush the workqueue during\ndquot_writeback_dquots() so we dont have any pending workitems after\nfreeze.","modified":"2026-04-02T12:25:15.672840Z","published":"2025-01-08T17:49:17.889Z","related":["SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56780.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3e6ff207cd5bd924ad94cd1a7c633bcdac0ba1cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f3821acd7c3143145999248087de5fb4b48cf26"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ea87e34792258825d290f4dc5216276e91cb224"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a5abba5e0e586e258ded3e798fe5f69c66fec198"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab6cfcf8ed2c7496f55d020b65b1d8cd55d9a2cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac6f420291b3fee1113f21d612fa88b628afab5b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bcacb52a985f1b6d280f698a470b873dfe52728a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56780.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56780"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d40c192e119892799dd4ddf94f5cea6fa93775ef"},{"fixed":"a5abba5e0e586e258ded3e798fe5f69c66fec198"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"86d89987f0998c98f57d641e308b40452a994045"},{"fixed":"6f3821acd7c3143145999248087de5fb4b48cf26"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"89602de9a2d7080b7a4029d5c1bf8f78d295ff5f"},{"fixed":"ab6cfcf8ed2c7496f55d020b65b1d8cd55d9a2cb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3027e200dd58d5b437f16634dbbd355b29ffe0a6"},{"fixed":"3e6ff207cd5bd924ad94cd1a7c633bcdac0ba1cb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"dabc8b20756601b9e1cc85a81d47d3f98ed4d13a"},{"fixed":"bcacb52a985f1b6d280f698a470b873dfe52728a"},{"fixed":"8ea87e34792258825d290f4dc5216276e91cb224"},{"fixed":"ac6f420291b3fee1113f21d612fa88b628afab5b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"f3e9a2bbdeb8987508dd6bb2b701dea911d4daec"},{"last_affected":"903fc5d8cb48b0d2de7095ef40e39fd32bb27bd0"},{"last_affected":"31bed65eecbc5ce57592cfe31947eaa64e3d678e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-56780.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}