CVE-2021-45469

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker to trigger an out-of-bounds memory access in the Linux kernel's F2FS filesystem when processing extended attributes. It affects Linux systems using F2FS filesystem with kernels up to 5.15.11. Attackers could potentially crash the system or execute arbitrary code.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel through 5.15.11
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when F2FS filesystem is in use. Many systems use ext4 by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential privilege escalation to kernel-level code execution

🟠

Likely Case

System crash or denial of service through kernel panic

🟢

If Mitigated

Limited impact if F2FS filesystem is not in use or systems have kernel hardening protections

🌐 Internet-Facing: MEDIUM - Requires local access or ability to mount F2FS filesystem
🏢 Internal Only: MEDIUM - Local attackers or users with filesystem access could exploit

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and ability to create/modify files on F2FS filesystem

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.15.12 and later

Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/chao/linux.git/commit/?h=dev&id=5598b24efaf4892741c798b425d543e4bed357a1

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 5.15.12 or later. 2. Reboot system to load new kernel. 3. Verify kernel version with 'uname -r'

🔧 Temporary Workarounds

Disable F2FS filesystem

linux

Prevent use of F2FS filesystem to eliminate attack surface

# Remove F2FS kernel module: rmmod f2fs
# Blacklist F2FS module: echo 'blacklist f2fs' > /etc/modprobe.d/f2fs-blacklist.conf

🧯 If You Can't Patch

  • Restrict user access to systems using F2FS filesystem
  • Implement strict filesystem monitoring and alert on unusual xattr operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version: 'uname -r' and verify if <= 5.15.11. Check if F2FS is in use: 'lsmod | grep f2fs' or 'mount | grep f2fs'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is 5.15.12 or later: 'uname -r'. Confirm F2FS module is not loaded or patched.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • OOM killer messages
  • Filesystem corruption errors in dmesg

Network Indicators:

  • None - local filesystem vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "Oops" OR "BUG") AND ("f2fs" OR "xattr")

🔗 References

📤 Share & Export