Executive Summary

Informations
Name CVE-2024-57892 First vendor Publication 2025-01-15
Vendor Cve Last vendor Modification 2025-02-13

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer.

During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags.

To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.

[akpm@linux-foundation.org: coding-style cleanups]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57892

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 9
Os 3740

Sources (Detail)

https://git.kernel.org/stable/c/2d431192486367eee03cc28d0b53b97dafcb8e63
https://git.kernel.org/stable/c/2e3d203b1adede46bbba049e497765d67865be18
https://git.kernel.org/stable/c/58f9e20e2a7602e1dd649a1ec4790077c251cb6c
https://git.kernel.org/stable/c/5f3fd772d152229d94602bca243fbb658068a597
https://git.kernel.org/stable/c/8ff6f635a08c30559ded0c110c7ce03ba7747d11
https://git.kernel.org/stable/c/ba950a02d8d23811aa1120affd3adedcfac6153d
https://git.kernel.org/stable/c/f44e6d70c100614c211703f065cad448050e4a0e
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Date Informations
2025-07-14 12:38:54
  • Multiple Updates
2025-06-26 02:38:52
  • Multiple Updates
2025-06-25 12:36:53
  • Multiple Updates
2025-06-24 02:43:27
  • Multiple Updates
2025-05-27 02:48:56
  • Multiple Updates
2025-03-29 03:44:47
  • Multiple Updates
2025-03-28 13:48:01
  • Multiple Updates
2025-03-28 03:22:37
  • Multiple Updates
2025-03-25 03:28:33
  • Multiple Updates
2025-03-19 03:17:23
  • Multiple Updates
2025-03-18 03:30:22
  • Multiple Updates
2025-03-14 03:17:28
  • Multiple Updates
2025-03-06 14:14:02
  • Multiple Updates
2025-02-21 21:20:46
  • Multiple Updates
2025-02-13 17:20:35
  • Multiple Updates
2025-02-02 17:20:38
  • Multiple Updates
2025-01-23 21:20:33
  • Multiple Updates
2025-01-21 21:20:35
  • Multiple Updates
2025-01-17 17:20:28
  • Multiple Updates
2025-01-15 17:20:30
  • First insertion