Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0562: Use After Free

0
High
VulnerabilityCVE-2024-0562cvecve-2024-0562
Published: Mon Jan 15 2024 (01/15/2024, 19:01:36 UTC)
Source: CVE Database V5

Description

A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.

AI-Powered Analysis

AILast updated: 11/15/2025, 08:49:55 UTC

Technical Analysis

CVE-2024-0562 is a use-after-free vulnerability discovered in the Linux Kernel that arises during disk removal operations. When a disk is removed, the kernel function bdi_unregister is invoked to halt further write-back operations and waits for any associated delayed work to complete. However, due to a race condition, the function wb_inode_writeback_end() may schedule bandwidth estimation work after the delayed work completion, causing a timer to access the bdi_writeback structure that has already been freed. This use-after-free condition can lead to memory corruption, which attackers with local privileges can exploit to execute arbitrary code with elevated privileges or cause a denial of service by crashing the kernel. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only low privileges without user interaction. Although no known exploits are currently reported in the wild, the flaw affects all Linux kernel versions handling disk write-back in this manner. The vulnerability is particularly relevant for environments with frequent disk removal or hot-swapping, such as data centers and cloud infrastructure. The flaw was assigned and published by Red Hat on January 15, 2024, and no patches were linked at the time of reporting, indicating the need for vigilance and prompt patch application once available.

Potential Impact

For European organizations, this vulnerability poses significant risks to the confidentiality, integrity, and availability of Linux-based systems, especially those managing critical storage operations. Exploitation could allow local attackers to escalate privileges, potentially gaining root access, or cause system crashes leading to denial of service. This is particularly concerning for data centers, cloud service providers, and enterprises relying on Linux servers for critical infrastructure and services. The disruption could affect business continuity, data protection compliance (e.g., GDPR), and operational technology environments. Given the widespread use of Linux in European government, finance, telecommunications, and industrial sectors, the impact could be broad and severe if exploited. The absence of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

Organizations should monitor Linux kernel updates closely and apply security patches addressing CVE-2024-0562 as soon as they are released by their Linux distribution vendors. Until patches are available, administrators should minimize disk removal or hot-swapping activities on production systems and avoid unnecessary write-back operations during maintenance windows. Implement strict access controls to limit local user privileges and employ kernel integrity monitoring tools to detect anomalous behavior related to write-back timers and memory corruption. Additionally, consider isolating critical systems to reduce the risk of local privilege escalation spreading. Regularly audit system logs for kernel errors or crashes that might indicate exploitation attempts. Engage with Linux vendor security advisories and subscribe to vulnerability notifications to stay informed about patch availability and exploit developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-15T15:02:03.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69183b387ca9874b8f7d7bbe

Added to database: 11/15/2025, 8:35:04 AM

Last enriched: 11/15/2025, 8:49:55 AM

Last updated: 11/15/2025, 3:21:08 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats