
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in the Linux kernel's f2fs (Flash-Friendly File System) implementation, tracked as CVE-2024-49859. The issue was discovered and disclosed on October 21, 2024, affecting various Linux kernel versions up to 6.1.113, from 6.2 to 6.6.54, from 6.7 to 6.10.13, and from 6.11 to 6.11.2. The vulnerability stems from certain f2fs ioctl interfaces failing to check atomic_write status (NVD).
The vulnerability exists in several f2fs ioctl interfaces including f2fsiocsetpinfile(), f2fsmovefilerange(), and f2fsdefragmentrange(), which failed to properly check atomicwrite status. This oversight could potentially lead to race conditions. The issue has been assigned a CVSS v3.1 base score of 4.7 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access required, high attack complexity, low privileges required, no user interaction needed, and high impact on availability (NVD).
The vulnerability primarily affects system availability. If exploited, it could lead to potential race conditions in the f2fs filesystem operations, which might result in system instability or denial of service (NVD).
The vulnerability has been patched in the Linux kernel. The fix involves adding proper atomic_file checks in the affected f2fs ioctl interfaces. Updates are available for various kernel versions, including 6.11.0-18.18 for Ubuntu 24.10, 6.8.0-54.56 for Ubuntu 24.04 LTS, and other distributions (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."