Skip to main content

CVE-2024-26871: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26871cvecve-2024-26871
Published: Wed Apr 17 2024 (04/17/2024, 10:27:31 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix NULL pointer dereference in f2fs_submit_page_write() BUG: kernel NULL pointer dereference, address: 0000000000000014 RIP: 0010:f2fs_submit_page_write+0x6cf/0x780 [f2fs] Call Trace: <TASK> ? show_regs+0x6e/0x80 ? __die+0x29/0x70 ? page_fault_oops+0x154/0x4a0 ? prb_read_valid+0x20/0x30 ? __irq_work_queue_local+0x39/0xd0 ? irq_work_queue+0x36/0x70 ? do_user_addr_fault+0x314/0x6c0 ? exc_page_fault+0x7d/0x190 ? asm_exc_page_fault+0x2b/0x30 ? f2fs_submit_page_write+0x6cf/0x780 [f2fs] ? f2fs_submit_page_write+0x736/0x780 [f2fs] do_write_page+0x50/0x170 [f2fs] f2fs_outplace_write_data+0x61/0xb0 [f2fs] f2fs_do_write_data_page+0x3f8/0x660 [f2fs] f2fs_write_single_data_page+0x5bb/0x7a0 [f2fs] f2fs_write_cache_pages+0x3da/0xbe0 [f2fs] ... It is possible that other threads have added this fio to io->bio and submitted the io->bio before entering f2fs_submit_page_write(). At this point io->bio = NULL. If is_end_zone_blkaddr(sbi, fio->new_blkaddr) of this fio is true, then an NULL pointer dereference error occurs at bio_get(io->bio). The original code for determining zone end was after "out:", which would have missed some fio who is zone end. I've moved this code before "skip:" to make sure it's done for each fio.

AI-Powered Analysis

AILast updated: 06/29/2025, 19:41:19 UTC

Technical Analysis

CVE-2024-26871 is a vulnerability identified in the Linux kernel's f2fs (Flash-Friendly File System) module, specifically within the function f2fs_submit_page_write(). The issue arises due to a NULL pointer dereference when handling certain page write operations. The root cause is a race condition where multiple threads may add the same fio (file I/O structure) to io->bio and submit the io->bio before the current thread enters f2fs_submit_page_write(). This leads to io->bio being NULL at the time of dereference. Additionally, if the function is_end_zone_blkaddr(sbi, fio->new_blkaddr) returns true, indicating the fio is at the end of a zone, the code attempts to access bio_get(io->bio), resulting in a NULL pointer dereference and a kernel crash (BUG). The vulnerability was introduced due to incorrect placement of the zone end check in the code, which was originally after a label "out:" and missed some fio instances that are at the zone end. The fix involved moving this check before the "skip:" label to ensure it is executed for each fio. This vulnerability can cause a denial of service (DoS) by crashing the kernel due to the NULL pointer dereference. The vulnerability affects specific Linux kernel versions identified by commit hashes, and no known exploits are currently reported in the wild. The vulnerability does not require user interaction but is triggered by specific file system operations on f2fs volumes. The technical details indicate that the vulnerability was reserved in February 2024 and published in April 2024, with no CVSS score assigned yet.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running the Linux kernel with the f2fs file system enabled and actively used. The impact is mainly a denial of service, where an attacker or a malicious process could trigger a kernel crash, leading to system instability or downtime. This could affect servers, embedded devices, or workstations using f2fs, potentially disrupting critical services or operations. Since f2fs is optimized for flash storage, it is commonly used in embedded systems, mobile devices, and some cloud or edge computing environments. Organizations relying on such infrastructure could face operational interruptions. Although no known exploits are reported, the vulnerability's nature as a kernel NULL pointer dereference means it could be leveraged in targeted attacks to cause system crashes or potentially escalate privileges if combined with other vulnerabilities. The impact on confidentiality and integrity is limited, but availability is significantly affected. European organizations in sectors such as telecommunications, manufacturing, automotive, and cloud service providers that utilize Linux with f2fs could be particularly impacted.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2024-26871 as soon as they are released and tested for your environment. 2. Identify and inventory all systems using the f2fs file system, especially those running affected kernel versions, to prioritize patching. 3. For embedded or specialized devices where kernel updates are challenging, consider disabling or avoiding the use of f2fs if feasible. 4. Implement monitoring for kernel crashes and unusual file system behavior that could indicate exploitation attempts. 5. Use kernel crash dump analysis tools to quickly diagnose and respond to incidents related to this vulnerability. 6. Employ strict access controls and limit untrusted user or process capabilities that could trigger file system writes to f2fs volumes. 7. In environments where uptime is critical, consider deploying redundant systems or failover mechanisms to mitigate potential downtime from kernel crashes. 8. Stay informed through Linux kernel mailing lists and security advisories for any emerging exploit reports or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.184Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe3e02

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 7:41:19 PM

Last updated: 8/15/2025, 6:32:45 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats