CVE-2024-0562Use After Free in Kernel

CWE-416Use After Free8 documents8 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 96.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15

Description

A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

NVDlinux/linux_kernel5.155.15.164+2
Debianlinux/linux_kernel< 5.19.6-1+2

Also affects: Enterprise Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
CVEList
Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c2024-01-15
GHSA
GHSA-q94c-x56g-qr59: A use-after-free flaw was found in the Linux Kernel2024-01-15
OSV
CVE-2024-0562: A use-after-free flaw was found in the Linux Kernel2024-01-15

📋Vendor Advisories

3
Microsoft
Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c2024-01-09
Debian
CVE-2024-0562: linux - A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi...2024
Red Hat
kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c2023-03-10

💬Community

1
Bugzilla
CVE-2024-0562 kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c2024-01-15
CVE-2024-0562 — Use After Free in Linux Kernel | cvebase