f2fs: remove clear SB_INLINECRYPT flag in default_options
In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.
If create new file or open file during this gap, these files
will not use inlinecrypt. Worse case, it may lead to data
corruption if wrappedkey_v0 is enable.
Thread A: Thread B:
-f2fs_remount -f2fs_file_open or f2fs_new_inode
-default_options
<- clear SB_INLINECRYPT flag
-fscrypt_select_encryption_impl
-parse_options
<- set SB_INLINECRYPT again
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4008-1 | linux-6.1 security update |
![]() |
DSA-5730-1 | linux security update |
![]() |
DSA-5731-1 | linux security update |
![]() |
USN-6999-1 | Linux kernel vulnerabilities |
![]() |
USN-6999-2 | Linux kernel vulnerabilities |
![]() |
USN-7004-1 | Linux kernel vulnerabilities |
![]() |
USN-7005-1 | Linux kernel vulnerabilities |
![]() |
USN-7005-2 | Linux kernel vulnerabilities |
![]() |
USN-7007-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-2 | Linux kernel vulnerabilities |
![]() |
USN-7007-3 | Linux kernel vulnerabilities |
![]() |
USN-7008-1 | Linux kernel vulnerabilities |
![]() |
USN-7009-1 | Linux kernel vulnerabilities |
![]() |
USN-7009-2 | Linux kernel vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
![]() |
USN-7029-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 06 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-07-11T17:19:52.993Z
Reserved: 2024-07-12T12:17:45.603Z
Link: CVE-2024-40971

Updated: 2024-08-02T04:39:55.892Z

Status : Analyzed
Published: 2024-07-12T13:15:18.750
Modified: 2025-10-06T20:44:21.637
Link: CVE-2024-40971


Updated: 2025-07-12T22:31:19Z