
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-42296 affects the Linux kernel's F2FS (Flash-Friendly File System) implementation. The vulnerability was discovered in the f2fsconvertinline_inode() function, which incorrectly handles return values when the device is in read-only mode. This issue was reported by syzbot and has been fixed in various Linux kernel versions (Kernel Git).
The vulnerability exists in the f2fsconvertinlineinode() function within the F2FS filesystem code. When the device is in read-only mode, the function incorrectly returns zero instead of the proper error code (-EROFS). This incorrect return value can trigger a kernel panic during writeback of inline inode's dirty page, leading to a system crash. The issue manifests in the call chain through f2fswritesingledata_page and related functions (Kernel Git).
When exploited, this vulnerability can cause a kernel panic during writeback operations of inline inode's dirty pages on read-only F2FS filesystems. This results in a denial of service condition, forcing the system to crash and restart (NVD).
The issue has been fixed by modifying the f2fsconvertinline_inode() function to return -EROFS instead of zero when the device is in read-only mode. This patch has been merged into various Linux kernel versions. Users should update their kernel to a version containing the fix (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."