| Name | CVE-2024-40971 | 
| Description | In the Linux kernel, the following vulnerability has been resolved:  f2fs: remove clear SB_INLINECRYPT flag in default_options  In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set. If create new file or open file during this gap, these files will not use inlinecrypt. Worse case, it may lead to data corruption if wrappedkey_v0 is enable.  Thread A:                               Thread B:  -f2fs_remount				-f2fs_file_open or f2fs_new_inode   -default_options 	<- clear SB_INLINECRYPT flag                                            -fscrypt_select_encryption_impl    -parse_options 	<- set SB_INLINECRYPT again | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-4008-1, DSA-5730-1, DSA-5731-1 | 
The table below lists information on source packages.
The information below is based on the following data on fixed versions.