Use After Free Affecting kernel-uek-container-debug package, versions <0:5.4.17-2136.341.3.3.el7uek


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-KERNELUEKCONTAINERDEBUG-9509381
  • published22 Mar 2025
  • disclosed15 Jan 2025

Introduced: 15 Jan 2025

CVE-2024-57892  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Oracle:7 kernel-uek-container-debug to version 0:5.4.17-2136.341.3.3.el7uek or higher.
This issue was patched in ELSA-2025-20190.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-uek-container-debug package and not the kernel-uek-container-debug package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a slab-use-after-free occurs after the user uses a syscall to quota_getnextquota. Specifically, sb_dqinfo(sb, type)->dqi_priv is the dangling pointer.

During the remounting process, the pointer dqi_priv is freed but is never set as null leaving it to be accessed. Additionally, the read-only option for remounting sets the DQUOT_SUSPENDED flag instead of setting the DQUOT_USAGE_ENABLED flags. Moreover, later in the process of getting the next quota, the function ocfs2_get_next_id is called and only checks the quota usage flags and not the quota suspended flags.

To fix this, I set dqi_priv to null when it is freed after remounting with read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.

[akpm@linux-foundation.org: coding-style cleanups]

CVSS Base Scores

version 3.1