๐Ÿ” CVE Alert

CVE-2024-57892

HIGH 7.8

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer. During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags. To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id. [[email protected]: coding-style cleanups]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8f9e8f5fcc059a3cba87ce837c88316797ef3645 < 58f9e20e2a7602e1dd649a1ec4790077c251cb6c 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < 8ff6f635a08c30559ded0c110c7ce03ba7747d11 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < f44e6d70c100614c211703f065cad448050e4a0e 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < 2d431192486367eee03cc28d0b53b97dafcb8e63 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < 2e3d203b1adede46bbba049e497765d67865be18 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < ba950a02d8d23811aa1120affd3adedcfac6153d 8f9e8f5fcc059a3cba87ce837c88316797ef3645 < 5f3fd772d152229d94602bca243fbb658068a597
Linux / Linux
4.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/58f9e20e2a7602e1dd649a1ec4790077c251cb6c git.kernel.org: https://git.kernel.org/stable/c/8ff6f635a08c30559ded0c110c7ce03ba7747d11 git.kernel.org: https://git.kernel.org/stable/c/f44e6d70c100614c211703f065cad448050e4a0e git.kernel.org: https://git.kernel.org/stable/c/2d431192486367eee03cc28d0b53b97dafcb8e63 git.kernel.org: https://git.kernel.org/stable/c/2e3d203b1adede46bbba049e497765d67865be18 git.kernel.org: https://git.kernel.org/stable/c/ba950a02d8d23811aa1120affd3adedcfac6153d git.kernel.org: https://git.kernel.org/stable/c/5f3fd772d152229d94602bca243fbb658068a597 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html