
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-40998 affects the Linux kernel's ext4 filesystem implementation, specifically related to an uninitialized ratelimitstate->lock access in the _ext4fillsuper() function. The vulnerability was discovered in July 2024 and affects various Linux kernel versions (NVD).
The vulnerability occurs due to a race condition where the ext4registersysfs() function is called before initializing the ratelimitstate lock. This creates a scenario where other processes can modify rs->interval to a non-zero value via the msgratelimitintervalms interface while rs->lock is uninitialized, leading to access of an uninitialized lock. The issue manifests in the following sequence: ext4fillsuper -> ext4registersysfs -> msgratelimitintervalms -> ext4orphancleanup -> ext4msg -> ext4msg -> ratelimit (Kernel Commit).
The vulnerability can lead to system instability and potential denial of service conditions when mounting ext4 filesystems. When triggered, it causes the locking correctness validator to be disabled and can result in system crashes (Red Hat).
The issue has been fixed by moving the ext4registersysfs() call after all initializations are complete in the _ext4fill_super() function. Users should update their Linux kernel to a patched version. The fix has been included in various distribution updates including Red Hat Enterprise Linux (Red Hat) and Ubuntu (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."