Kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c
CVE-2024-0562
7.8HIGH
Key Information:
- Vendor
- Red Hat
- Status
- Vendor
- CVE Published:
- 15 January 2024
Summary
A use-after-free flaw exists within the Linux Kernel, particularly triggered during the removal of a disk. This issue occurs when the bdi_unregister function is invoked to halt write-back processes, while still waiting for associated delayed work completion. Consequently, the wb_inode_writeback_end function might schedule bandwidth estimation tasks post-completion, leading to scenarios where a timer attempts to interact with bdi_writeback that has already been freed. This oversight poses risks for system stability and may negatively impact performance.
Affected Version(s)
kernel 6.0-rc3
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database