CVE-2024-0562

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's writeback subsystem allows attackers to potentially crash the system or execute arbitrary code with kernel privileges. This affects Linux systems where disk devices can be dynamically removed. Attackers need local access to trigger the vulnerability.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific versions vary by distribution; generally affects kernel versions before fixes were backported (check vendor advisories for specifics).
Operating Systems: Linux distributions including RHEL, CentOS, Fedora, Ubuntu, Debian, and others
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ability to remove disk devices; systems with hot-swappable storage or virtualized environments are particularly vulnerable.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.

🟠

Likely Case

Kernel panic causing system crash and denial of service, requiring physical or remote console access to reboot.

🟢

If Mitigated

No impact if systems are patched or don't allow disk removal by untrusted users.

🌐 Internet-Facing: LOW - Requires local access to trigger, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers or malicious users with disk removal privileges could cause system crashes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to trigger disk removal; exploitation may be challenging due to timing constraints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by distribution; check specific vendor advisories (e.g., RHEL 8.9, 9.3 updates)

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:0412

Restart Required: Yes

Instructions:

1. Update kernel package using distribution's package manager. 2. For RHEL/CentOS: 'yum update kernel'. 3. For Ubuntu/Debian: 'apt update && apt upgrade linux-image-generic'. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Restrict disk removal permissions

linux

Prevent untrusted users from removing disk devices to block exploitation vector.

chmod 640 /sys/block/*/device/delete
setfacl -m u:root:rw /sys/block/*/device/delete

🧯 If You Can't Patch

  • Restrict physical and console access to systems
  • Implement strict access controls on disk management operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version against vendor advisories; for RHEL: 'rpm -q kernel' and compare to patched versions in RHSA-2024:0412.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and reboot; check that 'uname -r' shows patched version.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages in /var/log/messages or dmesg
  • Unexpected disk removal events in system logs

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND "panic" OR "Oops" AND "bdi" OR "writeback"

🔗 References

📤 Share & Export