Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0443: Transmission of Private Resources into a New Sphere ('Resource Leak')

0
Medium
VulnerabilityCVE-2024-0443cvecve-2024-0443
Published: Thu Jan 11 2024 (01/11/2024, 23:30:52 UTC)
Source: CVE Database V5

Description

A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:02:19 UTC

Technical Analysis

CVE-2024-0443 is a vulnerability in the Linux kernel's block I/O control group (blkio cgroup) subsystem, specifically in the destruction path implemented in block/blk-cgroup.c. The problem stems from a circular dependency in the cleanup process: when a cgroup is destroyed, the function cgroup_rstat_flush() is only invoked during css_release_work_fn(), which itself is called only after the blkcg reference count drops to zero. Due to this circular dependency, the blkcg and some associated blkgs structures are not freed properly after being taken offline, resulting in a memory leak. This leak can accumulate over time, especially in systems that frequently create and destroy cgroups, eventually leading to resource exhaustion and system instability, such as out-of-memory (OOM) errors. The vulnerability requires local access with low privileges and does not require user interaction, making it exploitable by any local user or process with limited permissions. The impact is limited to availability degradation, with no direct impact on confidentiality or integrity. No public exploits have been reported to date. The CVSS v3.1 score is 5.5 (medium severity), reflecting the local attack vector, low complexity, and no confidentiality or integrity impact. The issue affects Linux kernel versions that include the vulnerable blkio cgroup code path, which is common in many Linux distributions used in servers, desktops, and cloud environments. Because cgroups are widely used for resource management and container orchestration, this vulnerability has broad relevance. However, exploitation requires local access, limiting remote attack scenarios.

Potential Impact

The primary impact of CVE-2024-0443 is on system availability. The memory leak caused by the failure to free blkcg and blkgs structures can lead to gradual resource exhaustion, culminating in out-of-memory conditions that may cause system crashes or degraded performance. This can disrupt critical services, especially in environments that heavily rely on cgroups for resource isolation and management, such as containerized workloads, cloud infrastructure, and multi-tenant servers. While the vulnerability does not compromise confidentiality or integrity, the denial of service potential can affect business continuity and operational stability. Organizations with high-density container deployments or frequent cgroup lifecycle events are at greater risk. The requirement for local access means that attackers must already have some foothold on the system, but the low privilege requirement broadens the range of potential attackers to include unprivileged users or compromised processes. No known exploits in the wild reduce immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation and avoid system instability.

Mitigation Recommendations

To mitigate CVE-2024-0443, organizations should apply kernel patches provided by their Linux distribution vendors as soon as they become available. Until patches are applied, administrators should monitor memory usage closely on systems utilizing blkio cgroups, especially those with frequent cgroup creation and destruction. Limiting local access to trusted users and processes reduces the risk of exploitation. Employing strict access controls and auditing local user activities can help detect potential abuse. For containerized environments, consider minimizing unnecessary cgroup churn and reviewing container lifecycle management practices to reduce exposure. Additionally, updating container runtimes and orchestration platforms to versions that incorporate kernel patches or workarounds can help mitigate risk. In environments where patching is delayed, implementing resource limits and alerts for abnormal memory consumption can provide early warning of exploitation attempts. Finally, maintain up-to-date intrusion detection and prevention systems to detect anomalous local behavior indicative of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-11T20:41:30.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e667c

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 2/28/2026, 11:02:19 AM

Last updated: 3/25/2026, 4:38:43 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses