CVE-2024-0775Use After Free in Kernel

CWE-416Use After Free14 documents9 sources
Severity
7.1HIGHNVD
CNA6.7
EPSS
0.0%
top 96.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 22
Latest updateApr 9

Description

A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages2 packages

NVDlinux/linux_kernel< 6.4+1
Debianlinux/linux_kernel< 5.10.191-1+3

Also affects: Enterprise Linux 9.0

Patches

🔴Vulnerability Details

3
CVEList
Kernel: use-after-free while changing the mount option in __ext4_remount leading2024-01-22
OSV
CVE-2024-0775: A use-after-free flaw was found in the __ext4_remount in fs/ext4/super2024-01-22
GHSA
GHSA-w57v-9x67-753v: A use-after-free flaw was found in the __ext4_remount in fs/ext4/super2024-01-22

📋Vendor Advisories

9
Ubuntu
Linux kernel (Azure) vulnerabilities2024-04-09
Ubuntu
Linux kernel vulnerabilities2024-03-25
Ubuntu
Linux kernel (AWS) vulnerabilities2024-03-21
Ubuntu
Linux kernel (GCP) vulnerabilities2024-03-20
Ubuntu
Linux kernel vulnerabilities2024-03-18

💬Community

1
Bugzilla
CVE-2024-0775 kernel: use-after-free while changing the mount option in __ext4_remount leading2024-01-21
CVE-2024-0775 — Use After Free in Linux Kernel | cvebase