Vulnerability Details : CVE-2024-57892
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
When mounting ocfs2 and then remounting it as read-only, a
slab-use-after-free occurs after the user uses a syscall to
quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the
dangling pointer.
During the remounting process, the pointer dqi_priv is freed but is never
set as null leaving it to be accessed. Additionally, the read-only option
for remounting sets the DQUOT_SUSPENDED flag instead of setting the
DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the
next quota, the function ocfs2_get_next_id is called and only checks the
quota usage flags and not the quota suspended flags.
To fix this, I set dqi_priv to null when it is freed after remounting with
read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.
[akpm@linux-foundation.org: coding-style cleanups]
Vulnerability category: Memory Corruption
Products affected by CVE-2024-57892
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-57892
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 5 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-57892
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-13 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2025-01-21 |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-57892 | 2025-01-16 |
CWE ids for CVE-2024-57892
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-57892
-
https://git.kernel.org/stable/c/f44e6d70c100614c211703f065cad448050e4a0e
-
https://git.kernel.org/stable/c/2e3d203b1adede46bbba049e497765d67865be18
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/2d431192486367eee03cc28d0b53b97dafcb8e63
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/8ff6f635a08c30559ded0c110c7ce03ba7747d11
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/ba950a02d8d23811aa1120affd3adedcfac6153d
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/58f9e20e2a7602e1dd649a1ec4790077c251cb6c
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/5f3fd772d152229d94602bca243fbb658068a597
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv - kernel/git/stable/linux.git - Linux kernel stable treePatch
Jump to