lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025120454-CVE-2025-40220-2127@gregkh>
Date: Thu,  4 Dec 2025 15:50:54 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

fuse: fix livelock in synchronous file put from fuseblk workers

I observed a hang when running generic/323 against a fuseblk server.
This test opens a file, initiates a lot of AIO writes to that file
descriptor, and closes the file descriptor before the writes complete.
Unsurprisingly, the AIO exerciser threads are mostly stuck waiting for
responses from the fuseblk server:

# cat /proc/372265/task/372313/stack
[<0>] request_wait_answer+0x1fe/0x2a0 [fuse]
[<0>] __fuse_simple_request+0xd3/0x2b0 [fuse]
[<0>] fuse_do_getattr+0xfc/0x1f0 [fuse]
[<0>] fuse_file_read_iter+0xbe/0x1c0 [fuse]
[<0>] aio_read+0x130/0x1e0
[<0>] io_submit_one+0x542/0x860
[<0>] __x64_sys_io_submit+0x98/0x1a0
[<0>] do_syscall_64+0x37/0xf0
[<0>] entry_SYSCALL_64_after_hwframe+0x4b/0x53

But the /weird/ part is that the fuseblk server threads are waiting for
responses from itself:

# cat /proc/372210/task/372232/stack
[<0>] request_wait_answer+0x1fe/0x2a0 [fuse]
[<0>] __fuse_simple_request+0xd3/0x2b0 [fuse]
[<0>] fuse_file_put+0x9a/0xd0 [fuse]
[<0>] fuse_release+0x36/0x50 [fuse]
[<0>] __fput+0xec/0x2b0
[<0>] task_work_run+0x55/0x90
[<0>] syscall_exit_to_user_mode+0xe9/0x100
[<0>] do_syscall_64+0x43/0xf0
[<0>] entry_SYSCALL_64_after_hwframe+0x4b/0x53

The fuseblk server is fuse2fs so there's nothing all that exciting in
the server itself.  So why is the fuse server calling fuse_file_put?
The commit message for the fstest sheds some light on that:

"By closing the file descriptor before calling io_destroy, you pretty
much guarantee that the last put on the ioctx will be done in interrupt
context (during I/O completion).

Aha.  AIO fgets a new struct file from the fd when it queues the ioctx.
The completion of the FUSE_WRITE command from userspace causes the fuse
server to call the AIO completion function.  The completion puts the
struct file, queuing a delayed fput to the fuse server task.  When the
fuse server task returns to userspace, it has to run the delayed fput,
which in the case of a fuseblk server, it does synchronously.

Sending the FUSE_RELEASE command sychronously from fuse server threads
is a bad idea because a client program can initiate enough simultaneous
AIOs such that all the fuse server threads end up in delayed_fput, and
now there aren't any threads left to handle the queued fuse commands.

Fix this by only using asynchronous fputs when closing files, and leave
a comment explaining why.

The Linux kernel CVE team has assigned CVE-2025-40220 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 5.10.246 with commit 548e1f2bac1d4df91a6138f26bb4ab00323fd948
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 5.15.196 with commit cfd1aa3e2b71f3327cb373c45a897c9028c62b35
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 6.1.158 with commit 83b375c6efef69b1066ad2d79601221e7892745a
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 6.6.115 with commit bfd17b6138df0122a95989457d8e18ce0b86165e
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 6.12.54 with commit b26923512dbe57ae4917bafd31396d22a9d1691a
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 6.17.4 with commit f19a1390af448d9e193c08e28ea5f727bf3c3049
	Issue introduced in 2.6.38 with commit 5a18ec176c934ca1bc9dc61580a5e0e90a9b5733 and fixed in 6.18 with commit 26e5c67deb2e1f42a951f022fdf5b9f7eb747b01
	Issue introduced in 2.6.32.32 with commit 9efe56738fecd591b5bf366a325440f9b457ebd6
	Issue introduced in 2.6.33.8 with commit 5c46eb076e0a1b2c1769287cd6942e4594ade1b1
	Issue introduced in 2.6.34.10 with commit 83e6726210d6c815ce044437106c738eda5ff6f6
	Issue introduced in 2.6.35.12 with commit 23d154c71721fd0fa6199851078f32e6bd765664
	Issue introduced in 2.6.37.3 with commit ca3edc920f5fd7d8ac040caaf109f925c24620a0

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-40220
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	fs/fuse/file.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/548e1f2bac1d4df91a6138f26bb4ab00323fd948
	https://git.kernel.org/stable/c/cfd1aa3e2b71f3327cb373c45a897c9028c62b35
	https://git.kernel.org/stable/c/83b375c6efef69b1066ad2d79601221e7892745a
	https://git.kernel.org/stable/c/bfd17b6138df0122a95989457d8e18ce0b86165e
	https://git.kernel.org/stable/c/b26923512dbe57ae4917bafd31396d22a9d1691a
	https://git.kernel.org/stable/c/f19a1390af448d9e193c08e28ea5f727bf3c3049
	https://git.kernel.org/stable/c/26e5c67deb2e1f42a951f022fdf5b9f7eb747b01

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ