In the Linux kernel, the following vulnerability has been resolved:
f2fs: remove clear SB_INLINECRYPT flag in default_options
In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.
If create new file or open file during this gap, these files
will not use inlinecrypt. Worse case, it may lead to data
corruption if wrappedkey_v0 is enable.
Thread A: Thread B:
-f2fs_remount -f2fs_file_open or f2fs_new_inode
-default_options
<- clear SB_INLINECRYPT flag
-fscrypt_select_encryption_impl
-parse_options
<- set SB_INLINECRYPT again
References
Configurations
Configuration 1 (hide)
|
History
06 Oct 2025, 20:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71 - Patch | |
References | () https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae - Patch | |
References | () https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4 - Patch | |
References | () https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33 - Patch | |
References | () https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66 - Patch | |
References | () https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2 - Patch |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71 - | |
References | () https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae - | |
References | () https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4 - | |
References | () https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33 - | |
References | () https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66 - | |
References | () https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2 - | |
Summary |
|
12 Jul 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-10-06 20:44
NVD link : CVE-2024-40971
Mitre link : CVE-2024-40971
CVE.ORG link : CVE-2024-40971
JSON object : View
Products Affected
linux
- linux_kernel
CWE