Bug 1227909 (CVE-2024-40971) - VUL-0: CVE-2024-40971: kernel: f2fs: remove clear SB_INLINECRYPT flag in default_options
Summary: VUL-0: CVE-2024-40971: kernel: f2fs: remove clear SB_INLINECRYPT flag in defa...
Status: NEW
Alias: CVE-2024-40971
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/413898/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40971:4.7:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-16 09:55 UTC by SMASH SMASH
Modified: 2024-07-16 09:56 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-16 09:55:51 UTC
In the Linux kernel, the following vulnerability has been resolved:

f2fs: remove clear SB_INLINECRYPT flag in default_options

In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.
If create new file or open file during this gap, these files
will not use inlinecrypt. Worse case, it may lead to data
corruption if wrappedkey_v0 is enable.

Thread A:                               Thread B:

-f2fs_remount				-f2fs_file_open or f2fs_new_inode
  -default_options
	<- clear SB_INLINECRYPT flag

                                          -fscrypt_select_encryption_impl

  -parse_options
	<- set SB_INLINECRYPT again

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40971
https://www.cve.org/CVERecord?id=CVE-2024-40971
https://git.kernel.org/stable/c/38a82c8d00638bb642bef787eb1d5e0e4d3b7d71
https://git.kernel.org/stable/c/724429db09e21ee153fef35e34342279d33df6ae
https://git.kernel.org/stable/c/a9cea0489c562c97cd56bb345e78939f9909e7f4
https://git.kernel.org/stable/c/ac5eecf481c29942eb9a862e758c0c8b68090c33
https://git.kernel.org/stable/c/ae39c8ec4250d2a35ddaab1c40faacfec306ff66
https://git.kernel.org/stable/c/eddeb8d941d5be11a9da5637dbe81ac37e8449a2
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40971.mbox