CVE-2024-57892

Source
https://cve.org/CVERecord?id=CVE-2024-57892
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57892.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57892
Downstream
Related
Published
2025-01-15T13:05:44.635Z
Modified
2026-03-20T12:41:02.687245Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quotagetnextquota. Specifically, sbdqinfo(sb, type)->dqi_priv is the dangling pointer.

During the remounting process, the pointer dqipriv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOTSUSPENDED flag instead of setting the DQUOTUSAGEENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2getnext_id is called and only checks the quota usage flags and not the quota suspended flags.

To fix this, I set dqipriv to null when it is freed after remounting with read-only and put a check for DQUOTSUSPENDED in ocfs2getnext_id.

[akpm@linux-foundation.org: coding-style cleanups]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57892.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8f9e8f5fcc059a3cba87ce837c88316797ef3645
Fixed
58f9e20e2a7602e1dd649a1ec4790077c251cb6c
Fixed
8ff6f635a08c30559ded0c110c7ce03ba7747d11
Fixed
f44e6d70c100614c211703f065cad448050e4a0e
Fixed
2d431192486367eee03cc28d0b53b97dafcb8e63
Fixed
2e3d203b1adede46bbba049e497765d67865be18
Fixed
ba950a02d8d23811aa1120affd3adedcfac6153d
Fixed
5f3fd772d152229d94602bca243fbb658068a597

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57892.json"