Skip to main content

CVE-2024-39467: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-39467cvecve-2024-39467
Published: Tue Jun 25 2024 (06/25/2024, 14:25:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() syzbot reports a kernel bug as below: F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4 ================================================================== BUG: KASAN: slab-out-of-bounds in f2fs_test_bit fs/f2fs/f2fs.h:2933 [inline] BUG: KASAN: slab-out-of-bounds in current_nat_addr fs/f2fs/node.h:213 [inline] BUG: KASAN: slab-out-of-bounds in f2fs_get_node_info+0xece/0x1200 fs/f2fs/node.c:600 Read of size 1 at addr ffff88807a58c76c by task syz-executor280/5076 CPU: 1 PID: 5076 Comm: syz-executor280 Not tainted 6.9.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 f2fs_test_bit fs/f2fs/f2fs.h:2933 [inline] current_nat_addr fs/f2fs/node.h:213 [inline] f2fs_get_node_info+0xece/0x1200 fs/f2fs/node.c:600 f2fs_xattr_fiemap fs/f2fs/data.c:1848 [inline] f2fs_fiemap+0x55d/0x1ee0 fs/f2fs/data.c:1925 ioctl_fiemap fs/ioctl.c:220 [inline] do_vfs_ioctl+0x1c07/0x2e50 fs/ioctl.c:838 __do_sys_ioctl fs/ioctl.c:902 [inline] __se_sys_ioctl+0x81/0x170 fs/ioctl.c:890 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f The root cause is we missed to do sanity check on i_xattr_nid during f2fs_iget(), so that in fiemap() path, current_nat_addr() will access nat_bitmap w/ offset from invalid i_xattr_nid, result in triggering kasan bug report, fix it.

AI-Powered Analysis

AILast updated: 06/29/2025, 12:39:32 UTC

Technical Analysis

CVE-2024-39467 is a vulnerability identified in the Linux kernel's F2FS (Flash-Friendly File System) implementation. The root cause stems from a missing sanity check on the inode's extended attribute node identifier (i_xattr_nid) during the f2fs_iget() function call. This omission allows the function current_nat_addr() to access the NAT (Node Address Table) bitmap with an offset derived from an invalid i_xattr_nid value. Consequently, this leads to out-of-bounds memory access, as detected by the Kernel Address Sanitizer (KASAN), resulting in slab-out-of-bounds errors. The vulnerability manifests during the fiemap() path, which is used to retrieve file extent mappings, and can cause kernel crashes or memory corruption. The bug was reported by syzbot, an automated kernel fuzzing tool, and affects Linux kernel versions prior to the patch that introduced the sanity check. The technical details indicate that the flaw can be triggered via ioctl system calls related to file extent mapping on F2FS file systems. Although no known exploits are currently reported in the wild, the vulnerability poses a risk of local denial of service or potential escalation if exploited. The issue is specific to the F2FS file system, which is optimized for flash storage devices and is used in various Linux environments, including embedded systems and cloud infrastructure.

Potential Impact

For European organizations, the impact of CVE-2024-39467 can be significant, particularly for those relying on Linux systems with F2FS file systems. This includes cloud service providers, data centers, and enterprises using Linux-based storage solutions optimized for flash memory. The vulnerability can lead to kernel crashes, causing denial of service conditions that disrupt critical services and applications. In environments where multi-tenant cloud infrastructure is deployed, such instability could affect multiple customers, leading to operational downtime and potential data integrity issues. Although exploitation requires local access, attackers who gain such access could leverage this vulnerability to destabilize systems or potentially escalate privileges if combined with other vulnerabilities. Given the widespread use of Linux in European IT infrastructure, especially in sectors like finance, telecommunications, and government, the vulnerability could impact service availability and trustworthiness. Furthermore, organizations with embedded Linux devices using F2FS could face risks of device malfunction or compromise, affecting operational technology and IoT deployments.

Mitigation Recommendations

To mitigate CVE-2024-39467, European organizations should: 1) Apply the official Linux kernel patches that introduce the necessary sanity checks on i_xattr_nid in the F2FS codebase as soon as they become available from trusted sources or Linux distributions. 2) Identify and inventory systems using the F2FS file system, prioritizing updates on those exposed to untrusted users or running critical workloads. 3) Implement strict access controls and monitoring to limit local access to systems, reducing the risk of exploitation by unauthorized users. 4) Employ kernel hardening techniques such as enabling KASAN and other runtime memory protection features to detect and prevent exploitation attempts during development and testing phases. 5) For cloud environments, isolate workloads using F2FS to minimize cross-tenant impact in case of exploitation. 6) Regularly audit and update embedded devices running Linux with F2FS to ensure they receive security updates. 7) Monitor security advisories and threat intelligence feeds for any emerging exploit attempts related to this vulnerability to respond promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-25T14:23:23.744Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe2ca0

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 12:39:32 PM

Last updated: 8/11/2025, 10:17:51 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats