CVE-2024-57892

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57892
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-57892.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-57892
Downstream
Related
Published
2025-01-15T13:05:44.635Z
Modified
2025-11-28T02:34:55.710622Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quotagetnextquota. Specifically, sbdqinfo(sb, type)->dqi_priv is the dangling pointer.

During the remounting process, the pointer dqipriv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOTSUSPENDED flag instead of setting the DQUOTUSAGEENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2getnext_id is called and only checks the quota usage flags and not the quota suspended flags.

To fix this, I set dqipriv to null when it is freed after remounting with read-only and put a check for DQUOTSUSPENDED in ocfs2getnext_id.

[akpm@linux-foundation.org: coding-style cleanups]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57892.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8f9e8f5fcc059a3cba87ce837c88316797ef3645
Fixed
58f9e20e2a7602e1dd649a1ec4790077c251cb6c
Fixed
8ff6f635a08c30559ded0c110c7ce03ba7747d11
Fixed
f44e6d70c100614c211703f065cad448050e4a0e
Fixed
2d431192486367eee03cc28d0b53b97dafcb8e63
Fixed
2e3d203b1adede46bbba049e497765d67865be18
Fixed
ba950a02d8d23811aa1120affd3adedcfac6153d
Fixed
5f3fd772d152229d94602bca243fbb658068a597

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
5.4.290
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.234
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.177
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.125
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.70
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.9