CVE-2024-47689
CBL Mariner vulnerability analysis and mitigation

Overview

CVE-2024-47689 affects the Linux kernel's F2FS (Flash-Friendly File System) implementation. The vulnerability was discovered when syzbot reported a race condition bug in the f2fshandlecriticalerror() function. The issue occurs when the filesystem sets the SBRDONLY flag in an internal function without proper synchronization via the superblock's s_umount semaphore during remount procedures (NVD).

Technical details

The vulnerability stems from a race condition in the F2FS filesystem's error handling mechanism. The issue manifests when f2fshandlecriticalerror() sets the SBRDONLY flag directly, bypassing the proper remount procedure that should be protected by the sb->sumount semaphore. This can lead to a race condition between freezesuper() and thaw_super operations, potentially causing deadlocks and other synchronization problems. The CVSS v3.1 base score is 5.3 (Medium), with a vector of CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

The vulnerability can result in a race condition that may lead to system deadlocks when handling critical errors in the F2FS filesystem. This occurs specifically during the interaction between filesystem freezing operations and error handling procedures, potentially affecting system stability and availability (Kernel Patch).

Mitigation and workarounds

The vulnerability has been fixed by removing the direct setting of the SBRDONLY flag in f2fshandlecriticalerror(). The fix relies on the CPERRORFLAG to indicate filesystem stoppage and prevent further updates, aligning with the approach used in ext4. Users should update to patched kernel versions that include the fix. The patch has been merged into the mainline kernel and backported to affected stable kernel versions (Kernel Patch).

Additional resources


SourceThis report was generated using AI

Related CBL Mariner vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66031HIGH8.7
  • JavaScriptJavaScript
  • kibana-8.17
NoYesNov 26, 2025
CVE-2025-12638HIGH8
  • CBL MarinerCBL Mariner
  • keras
NoYesNov 28, 2025
CVE-2025-13601HIGH7.7
  • CBL MarinerCBL Mariner
  • glib2
NoYesNov 26, 2025
CVE-2025-66293HIGH7.1
  • OpenJDK JDKOpenJDK JDK
  • java-21-openjdk-headless-slowdebug
NoYesDec 03, 2025
CVE-2025-66030MEDIUM6.3
  • JavaScriptJavaScript
  • kibana-8.18
NoYesNov 26, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management