
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-47726 affects the Linux kernel's F2FS (Flash-Friendly File System) implementation. The vulnerability was discovered and disclosed in October 2024, specifically related to direct I/O completion handling in the F2FS file system. The issue occurs when the system fails to wait for all existing direct I/O write operations before block removal, which could lead to data corruption (Kernel Patch).
The vulnerability exists in the F2FS file system's handling of direct I/O operations. When blocks are removed, the system should wait for all existing direct I/O write operations to complete. Without this wait, previous direct write I/O operations may overwrite data in blocks that could be reused by other inodes. The issue has been assigned a CVSS v3.1 base score of 6.5 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) (NVD).
The vulnerability can lead to data corruption when direct I/O operations are performed on F2FS file systems. Specifically, data may be overwritten incorrectly when blocks are reused by different inodes, potentially compromising the integrity of files stored on the affected file system (Kernel Patch).
The vulnerability has been patched in the Linux kernel. The fix involves adding proper wait mechanisms for direct I/O completion before block removal operations. The patch has been applied to multiple kernel versions and is available through the stable kernel release process (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."