Cyber Posture

CVE-2024-41935

High

Published: 11 January 2025

Published
11 January 2025
Modified
23 September 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0001 1.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-41935 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 7.1 (High).

Operationally, ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SC-5 (Denial-of-service Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates CVE-2024-41935 by applying Linux kernel patches that process F2FS read extent nodes in batches to minimize prolonged rwlock holds during extent tree shrinking.

prevent

Protects against denial-of-service effects from local exploitation of the F2FS extent tree shrink operation causing kernel hangs due to extended rwlock acquisition.

prevent

Mitigates resource availability degradation from the prolonged critical section in F2FS rwlock-protected extent tree operations triggered by large numbers of extent nodes.

NVD Description

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to shrink read extent node in batches We use rwlock to protect core structure data of extent tree during its shrink, however, if there is a huge number…

more

of extent nodes in extent tree, during shrink of extent tree, it may hold rwlock for a very long time, which may trigger kernel hang issue. This patch fixes to shrink read extent node in batches, so that, critical region of the rwlock can be shrunk to avoid its extreme long time hold.

Deeper analysisAI

CVE-2024-41935 is a vulnerability in the Linux kernel's F2FS filesystem implementation. It occurs during the shrinking of the extent tree when a huge number of extent nodes are present, causing an rwlock protecting core structure data to be held for an excessively long time. This prolonged lock hold can trigger a kernel hang. The issue is classified under CWE-125 with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H).

A local attacker with low privileges can exploit this vulnerability without user interaction. By triggering the extent tree shrink operation under conditions with a large number of extent nodes, the attacker can cause the kernel to hang, resulting in a denial of service due to high availability impact. The vulnerability also allows for high confidentiality impact, though the primary effect described is the extended rwlock hold leading to system instability.

Mitigation is provided through kernel patches available in stable releases, as detailed in the following commit references: https://git.kernel.org/stable/c/295b50e95e900da31ff237e46e04525fa799b2cf, https://git.kernel.org/stable/c/3fc5d5a182f6a1f8bd4dc775feb54c369dd2c343, and https://git.kernel.org/stable/c/924f7dd1e832e4e4530d14711db223d2803f7b61. These patches modify the shrink process to handle read extent nodes in batches, reducing the duration of the rwlock's critical section and preventing prolonged holds.

Details

CWE(s)

Affected Products

linux
linux kernel
3.8 — 6.6.66 · 6.7 — 6.12.5

CVEs Like This One

CVE-2025-71231Same product: Linux Linux Kernel
CVE-2025-21782Same product: Linux Linux Kernel
CVE-2026-23099Same product: Linux Linux Kernel
CVE-2025-21743Same product: Linux Linux Kernel
CVE-2026-31558Same product: Linux Linux Kernel
CVE-2026-31614Same product: Linux Linux Kernel
CVE-2024-58015Same product: Linux Linux Kernel
CVE-2024-52332Same product: Linux Linux Kernel
CVE-2025-71093Same product: Linux Linux Kernel
CVE-2026-23397Same product: Linux Linux Kernel

References