Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0562: Use After Free

0
High
VulnerabilityCVE-2024-0562cvecve-2024-0562
Published: Mon Jan 15 2024 (01/15/2024, 19:01:36 UTC)
Source: CVE Database V5

Description

A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:03:29 UTC

Technical Analysis

CVE-2024-0562 is a use-after-free vulnerability discovered in the Linux Kernel, specifically triggered during the removal of a disk device. When a disk is removed, the kernel function bdi_unregister is invoked to halt further write-back operations and waits for any associated delayed work to complete. However, the function wb_inode_writeback_end() may still schedule bandwidth estimation work after this waiting period, which leads to a timer attempting to access the bdi_writeback structure that has already been freed. This use-after-free condition can cause the kernel to access invalid memory, potentially resulting in a system crash (denial of service) or enabling an attacker with local privileges to execute arbitrary code within the kernel context. The vulnerability requires local access with low privileges and does not require user interaction, making it easier to exploit in environments where local access is possible. The CVSS v3.1 score is 7.8, reflecting high severity due to the potential for full system compromise affecting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the nature of the flaw and its presence in the Linux kernel make it a significant risk. The vulnerability affects all Linux kernel versions prior to the patch and is relevant for systems that dynamically handle disk removal, including servers, desktops, and embedded devices running Linux. The flaw was publicly disclosed on January 15, 2024, and is tracked under CVE-2024-0562.

Potential Impact

The impact of CVE-2024-0562 is substantial for organizations relying on Linux-based systems, especially those that handle dynamic disk operations such as hot-swapping or removable storage. Successful exploitation can lead to kernel crashes causing denial of service, or worse, arbitrary code execution with kernel privileges, allowing attackers to bypass security controls, escalate privileges, and maintain persistent access. This threatens the confidentiality, integrity, and availability of affected systems. Critical infrastructure, cloud providers, data centers, and enterprises using Linux servers are particularly vulnerable. Embedded systems and IoT devices running Linux kernels with this flaw may also be compromised, potentially disrupting industrial or operational technology environments. Since exploitation requires local access, insider threats or compromised user accounts pose a significant risk vector. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for patching due to the ease of exploitation and high impact.

Mitigation Recommendations

To mitigate CVE-2024-0562, organizations should promptly apply official Linux kernel patches once available from their distribution vendors or kernel maintainers. Until patches are deployed, restrict local access to trusted users only and monitor for unusual kernel activity or crashes related to disk operations. Disable or limit hot-swapping or dynamic disk removal features where feasible to reduce exposure. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to increase exploitation difficulty. Use security modules like SELinux or AppArmor to enforce strict access controls on kernel interfaces. Regularly audit and update all Linux systems to the latest stable kernel versions. Additionally, implement comprehensive logging and alerting for disk-related kernel events to detect potential exploitation attempts early. For embedded devices, coordinate with vendors for timely firmware/kernel updates. Avoid running untrusted code or granting unnecessary local privileges to users to minimize attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-15T15:02:03.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69183b387ca9874b8f7d7bbe

Added to database: 11/15/2025, 8:35:04 AM

Last enriched: 2/28/2026, 11:03:29 AM

Last updated: 3/24/2026, 10:44:46 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses