In the Linux kernel, the following vulnerability has been resolved:
f2fs: remove clear SB_INLINECRYPT flag in default_options
In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.
If create new file or open file during this gap, these files
will not use inlinecrypt. Worse case, it may lead to data
corruption if wrappedkey_v0 is enable.
Thread A: Thread B:
-f2fs_remount -f2fs_file_open or f2fs_new_inode
-default_options
<- clear SB_INLINECRYPT flag
-fscrypt_select_encryption_impl
-parse_options
<- set SB_INLINECRYPT again
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Oct 2025, 20:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71 - Patch | |
| References | () https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae - Patch | |
| References | () https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4 - Patch | |
| References | () https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33 - Patch | |
| References | () https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66 - Patch | |
| References | () https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2 - Patch |
21 Nov 2024, 09:31
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71 - | |
| References | () https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae - | |
| References | () https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4 - | |
| References | () https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33 - | |
| References | () https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66 - | |
| References | () https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2 - |
12 Jul 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-11-03 22:17
NVD link : CVE-2024-40971
Mitre link : CVE-2024-40971
CVE.ORG link : CVE-2024-40971
JSON object : View
Products Affected
linux
- linux_kernel
CWE
