Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp2903793lqo; Tue, 21 May 2024 00:05:36 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXQh6sbUhEfLQK/P90En7LBYBG6nPHzGZPUrw5nyAw0Uc6y4aAlgRC4hUM/eHAQ+cx87UMfTr3x/5b+eQfRboYekgAlY7uamSPxfn7dkA== X-Google-Smtp-Source: AGHT+IGjTocf0jNq6y6HfqjFy6kku1Kmr4sXUTs4L68R2hxBrBM9ZKj7w4iuDPPbnxxVPWR48Qkt X-Received: by 2002:a05:6402:c96:b0:574:e1c4:6ea4 with SMTP id 4fb4d7f45d1cf-574e1c474c5mr12023536a12.10.1716275136256; Tue, 21 May 2024 00:05:36 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716275136; cv=pass; d=google.com; s=arc-20160816; b=O7M05MBe41F0sx7tZmz8tWa7ifZ7vz8COjhA8q9yes/NWBl5e/92yvci+BU604cwk5 xi0EiH1zTTrZWVger91ro+q528ik8mSUy/lD/ZiPZVnD0sZ0pVkqOBRi2yYZkBxIsS2H /nBhGUmFJWPeWu77tTpSGyh4hqf2TF95eOdQo8D7S1WH0INBsNev4bBhF/43ZmPaFsAh UYlsDU3l66JC5hP9bDSG7JQSFFckm5MLOeMKzYcubT2uhb6X7Od+/jKORtFU1EF9G321 Hfd5q6GVaPjcwWwZE5SLQ3CoJ/S5RopNPuHU/Z8NyaMrWHIfEM1gkdXou/BUGrVZdkZi mXOw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=74sQHaTgmlNO8WWrJOeeHQx1SM8OYtG050qKiQruXho=; fh=QA5aLSsv3J8KStQrNjjJfOjtn5PAhnb4SZlciYQaauQ=; b=ZHz4jzA/RY8MiqXEuimq+ETNUO5Z33o4L+qPwnFdJ/Nb+k/RVc8s/jra6cxZfb3C8t kR5dfBlmPPoC8OzeNxisiT7esLC02r/wON4ZgRk3c4c1fLYnWfMxBcXwANz81hwzlGbX zbrAiE+xqw8alDX7tYCyc1Dtg6uRoWZsvxeI78hsR2e0fHL7UBy5MQMkZkexh/zjZ5Ph vptybQggzUX839G1jQrTn6ynEHAivvZ3Rdr6KPmDephGqAup1OXUqVLgRCLuLkcJ88tH gIn2w0yMjmAsZrZp55SeC1q0cq+fO7p4NuUhilO85Cdkx9LlmXJltLS9yYe9WUk84gYC qP1A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=FpubFwbD; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-184546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id 4fb4d7f45d1cf-5733beace7csi13931208a12.95.2024.05.21.00.05.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 May 2024 00:05:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-184546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=FpubFwbD; arc=pass (i=1 dkim=pass dkdomain=linuxfoundation.org); spf=pass (google.com: domain of linux-kernel+bounces-184546-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184546-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id EE4971F2225D for ; Tue, 21 May 2024 07:05:35 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AB94548788; Tue, 21 May 2024 07:05:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="FpubFwbD" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C9ECA7F; Tue, 21 May 2024 07:05:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716275129; cv=none; b=ZIMdwTEU1lmBJLRVF6lKv/0WxKWTQVAZhn1VqME/vX2liFPmgEGtPJlB6/Fcn7lEeCPrEi0r6Kfn5x5PWRzPlERP7/LaOQb1Vepm6nQ5VD48h+UB23CEJXVhTIvIPmZfc+lUgpB73A42kt3qxIZ97gqIwdTEETRdkIzDaeKu8P0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716275129; c=relaxed/simple; bh=c15ujsRuh9F0sSf6p/i3/BKLdIXyJaOjwGLssPCITqs=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=kdAXttJjAnReh/xPQ77/RYnmO2rP5PSImmBDfkretqTTH/0chwYtBlztco+HtN/kH6r5DgKNeRTH8xLOLgyu5vWT3d8Pyi7fDRy9B1kW0/XzbAOhN09lDWN7eJSJki9wMJpgBLgVMkiej4KtrTf12JE5pTIgrb60nO2heCIyVhs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=FpubFwbD; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 51E85C2BD11; Tue, 21 May 2024 07:05:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1716275129; bh=c15ujsRuh9F0sSf6p/i3/BKLdIXyJaOjwGLssPCITqs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=FpubFwbDdYhOWxbBwoG1Ci3LjO/ByT9N4wesTog2P8vjKzZ0vWa+Qfq9hjCq0xYXc hbS5SwJF9nUGLvqCjIIJRg4wvvyCaeHze642XBmWvDio2qdRDIoOJzvJGF4tJLpb5+ XKp0pGe4LyLaaR5+IVRemhJa9/IP9S1Om/XM2m7s= Date: Tue, 21 May 2024 09:05:27 +0200 From: Greg Kroah-Hartman To: Filipe Manana Cc: cve@kernel.org, linux-kernel@vger.kernel.org, linux-cve-announce@vger.kernel.org Subject: Re: CVE-2024-26904: btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve Message-ID: <2024052155-raking-onshore-f6f3@gregkh> References: <2024041746-CVE-2024-26904-e3a8@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Mon, May 20, 2024 at 05:23:14PM +0100, Filipe Manana wrote: > On Wed, Apr 17, 2024 at 12:29:19PM +0200, Greg Kroah-Hartman wrote: > > Description > > =========== > > > > In the Linux kernel, the following vulnerability has been resolved: > > > > btrfs: fix data race at btrfs_use_block_rsv() when accessing block reserve > > May I ask why is this classified a CVE? > > How can a malicious user exploit this to do something harmful? > > The race was solved to silence KCSAN warnings, as from time to time we have > someone reporting it, but other than that, it should be harmless. Oops, you are right, the line "BUG:" triggered our review to tag this as a CVE. I'll go reject it now, thanks for the review. greg k-h