CVE-2024-40971
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: remove clear SB_INLINECRYPT flag in default_options<br />
<br />
In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.<br />
If create new file or open file during this gap, these files<br />
will not use inlinecrypt. Worse case, it may lead to data<br />
corruption if wrappedkey_v0 is enable.<br />
<br />
Thread A: Thread B:<br />
<br />
-f2fs_remount -f2fs_file_open or f2fs_new_inode<br />
-default_options<br />
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 5.10.221 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.96 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.36 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.7 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71
- https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae
- https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4
- https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33
- https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66
- https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2
- https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71
- https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae
- https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4
- https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33
- https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66
- https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



