{"id":"CVE-2024-43859","summary":"f2fs: fix to truncate preallocated blocks in f2fs_file_open()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to truncate preallocated blocks in f2fs_file_open()\n\nchenyuwen reports a f2fs bug as below:\n\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000011\n fscrypt_set_bio_crypt_ctx+0x78/0x1e8\n f2fs_grab_read_bio+0x78/0x208\n f2fs_submit_page_read+0x44/0x154\n f2fs_get_read_data_page+0x288/0x5f4\n f2fs_get_lock_data_page+0x60/0x190\n truncate_partial_data_page+0x108/0x4fc\n f2fs_do_truncate_blocks+0x344/0x5f0\n f2fs_truncate_blocks+0x6c/0x134\n f2fs_truncate+0xd8/0x200\n f2fs_iget+0x20c/0x5ac\n do_garbage_collect+0x5d0/0xf6c\n f2fs_gc+0x22c/0x6a4\n f2fs_disable_checkpoint+0xc8/0x310\n f2fs_fill_super+0x14bc/0x1764\n mount_bdev+0x1b4/0x21c\n f2fs_mount+0x20/0x30\n legacy_get_tree+0x50/0xbc\n vfs_get_tree+0x5c/0x1b0\n do_new_mount+0x298/0x4cc\n path_mount+0x33c/0x5fc\n __arm64_sys_mount+0xcc/0x15c\n invoke_syscall+0x60/0x150\n el0_svc_common+0xb8/0xf8\n do_el0_svc+0x28/0xa0\n el0_svc+0x24/0x84\n el0t_64_sync_handler+0x88/0xec\n\nIt is because inode.i_crypt_info is not initialized during below path:\n- mount\n - f2fs_fill_super\n  - f2fs_disable_checkpoint\n   - f2fs_gc\n    - f2fs_iget\n     - f2fs_truncate\n\nSo, let's relocate truncation of preallocated blocks to f2fs_file_open(),\nafter fscrypt_file_open().","aliases":["A-455892000","ASB-A-455892000"],"modified":"2026-04-16T04:43:30.659136292Z","published":"2024-08-17T09:24:28.672Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43859.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/298b1e4182d657c3e388adcc29477904e9600ed5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ba0ae885215b325605ff7ebf6de12ac2adf204d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5f04969136db674f133781626e0b692c5f2bf2f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f44a25a8bfe0c15d33244539696cd9119cf44d18"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43859.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43859"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d4dd19ec1ea0cf6532d65709325c42b1398614a8"},{"fixed":"5f04969136db674f133781626e0b692c5f2bf2f0"},{"fixed":"f44a25a8bfe0c15d33244539696cd9119cf44d18"},{"fixed":"3ba0ae885215b325605ff7ebf6de12ac2adf204d"},{"fixed":"298b1e4182d657c3e388adcc29477904e9600ed5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43859.json"}}],"schema_version":"1.7.5"}