CVE-2024-41935

7.1 HIGH

📋 TL;DR

A race condition vulnerability in the Linux kernel's F2FS filesystem could cause kernel hangs when shrinking large extent trees. This affects Linux systems using the F2FS filesystem, potentially leading to denial of service. The vulnerability requires local access to trigger.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Versions with vulnerable F2FS implementation before fixes
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using F2FS filesystem. The vulnerability is in the kernel's F2FS driver code.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system hang requiring hard reboot, causing extended downtime and potential data corruption.

🟠

Likely Case

Temporary system unresponsiveness or performance degradation when F2FS operations are performed.

🟢

If Mitigated

Minor performance impact during F2FS operations with proper kernel version.

🌐 Internet-Facing: LOW - Requires local access to filesystem operations, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local users or processes could trigger the condition, potentially affecting system stability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger F2FS extent tree operations. No known public exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 295b50e95e900da31ff237e46e04525fa799b2cf, 3fc5d5a182f6a1f8bd4dc775feb54c369dd2c343, or 924f7dd1e832e4e4530d14711db223d2803f7b61

Vendor Advisory: https://git.kernel.org/stable/c/295b50e95e900da31ff237e46e04525fa799b2cf

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.

🔧 Temporary Workarounds

Avoid F2FS usage

all

Use alternative filesystems instead of F2FS where possible

Limit F2FS operations

all

Restrict user access to F2FS filesystem operations

🧯 If You Can't Patch

  • Monitor system for hangs or performance issues related to F2FS operations
  • Implement strict access controls to limit who can perform filesystem operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if F2FS is in use. Vulnerable if using F2FS with kernel before fix commits.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version contains one of the fix commit hashes: 295b50e95e900da31ff237e46e04525fa799b2cf, 3fc5d5a182f6a1f8bd4dc775feb54c369dd2c343, or 924f7dd1e832e4e4530d14711db223d2803f7b61

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • System hang events in system logs
  • F2FS-related error messages

SIEM Query:

Search for kernel panic events or system hang alerts in system logs

🔗 References

📤 Share & Export