Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0775: Use After Free

0
Medium
VulnerabilityCVE-2024-0775cvecve-2024-0775
Published: Mon Jan 22 2024 (01/22/2024, 13:03:09 UTC)
Source: CVE Database V5

Description

A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:09:57 UTC

Technical Analysis

CVE-2024-0775 is a use-after-free vulnerability identified in the Linux kernel's ext4 filesystem code, specifically within the __ext4_remount function located in fs/ext4/super.c. The flaw arises when the kernel attempts to remount an ext4 filesystem and frees old quota file names prematurely before a potential failure is fully handled. This premature freeing leads to a use-after-free condition, where the kernel may access memory that has already been freed. Such a condition can cause information leakage by exposing kernel memory contents to a local attacker. The vulnerability requires the attacker to have local access with high privileges (PR:H), as indicated by the CVSS vector, and does not require user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), as the attacker could potentially manipulate kernel memory or cause system instability. The vulnerability has a CVSS v3.1 base score of 6.7, categorized as medium severity. No public exploits or patches are currently reported, but the flaw is significant due to its kernel-level nature and potential for privilege escalation or data leakage. The vulnerability affects all Linux systems using ext4 filesystems that have not been patched since the flaw was introduced. Given the widespread use of ext4 as the default filesystem in many Linux distributions, this vulnerability has broad implications.

Potential Impact

The impact of CVE-2024-0775 is considerable for organizations running Linux systems with ext4 filesystems. A successful exploitation could lead to unauthorized information disclosure from kernel memory, potentially exposing sensitive data such as credentials or cryptographic keys. Furthermore, the use-after-free condition could be leveraged to corrupt kernel memory, leading to system crashes or privilege escalation attacks, thereby compromising system integrity and availability. Organizations relying on Linux servers for critical infrastructure, cloud services, or enterprise applications could face operational disruptions and data breaches. Since the vulnerability requires local high-privilege access, the risk is elevated in environments where multiple users have administrative or sudo privileges, or where attackers have already gained limited local access. The lack of known exploits in the wild currently reduces immediate risk, but the potential for future exploit development remains. Failure to address this vulnerability could result in targeted attacks against Linux-based systems, especially in sectors with high-value data or critical operations.

Mitigation Recommendations

To mitigate CVE-2024-0775, organizations should prioritize applying official Linux kernel patches as soon as they become available from trusted sources or distribution vendors. Until patches are deployed, restrict local user privileges to minimize the number of users with high-level access capable of triggering the vulnerability. Implement strict access controls and auditing on systems running ext4 filesystems to detect unusual remount operations or kernel errors. Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce the risk of exploitation. Regularly update and patch Linux systems to incorporate security fixes promptly. Additionally, consider isolating critical systems and limiting local access to trusted personnel only. Monitoring system logs for anomalies related to filesystem remounts or quota operations can provide early warning signs of attempted exploitation. Finally, maintain comprehensive backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-21T12:37:58.285Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8557cba0e608b4fb1eed8

Added to database: 10/10/2025, 12:38:20 AM

Last enriched: 2/28/2026, 11:09:57 AM

Last updated: 3/26/2026, 3:28:28 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses