Memory Exhaustion Vulnerability in Linux Kernel Affecting File Handling
CVE-2024-14027

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
9 March 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2024-14027?

A vulnerability in the Linux kernel's file handling mechanism, specifically in the fremovexattr() syscall, can lead to kernel memory exhaustion. The issue arises when fdget() is called to acquire a file reference, but if strncpy_from_user() fails on the name input, the function exits prematurely without executing fdput(). This oversight leads to a persistent file reference leak, where each unsuccessful call creates a pin in memory, resulting in potential exhaustion of kernel memory resources for unprivileged local users. The vulnerability has been addressed in the Linux kernel with a fix implemented in commit a71874379ec8.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux c3a5e3e872f3688ae0dc57bb78ca633921d96a91

Linux c3a5e3e872f3688ae0dc57bb78ca633921d96a91

Linux c03185f4a23e7f89d84c9981091770e876e64480

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.