CVE-2024-0562
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's writeback subsystem allows attackers to potentially crash the system or execute arbitrary code with kernel privileges. This affects Linux systems where disk devices can be dynamically removed. Attackers need local access to trigger the vulnerability.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash or potential arbitrary code execution with kernel privileges, resulting in complete system compromise.
Likely Case
Kernel panic causing system crash and denial of service, requiring physical or remote console access to reboot.
If Mitigated
No impact if systems are patched or don't allow disk removal by untrusted users.
🎯 Exploit Status
Requires local access and ability to trigger disk removal; exploitation may be challenging due to timing constraints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by distribution; check specific vendor advisories (e.g., RHEL 8.9, 9.3 updates)
Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:0412
Restart Required: Yes
Instructions:
1. Update kernel package using distribution's package manager. 2. For RHEL/CentOS: 'yum update kernel'. 3. For Ubuntu/Debian: 'apt update && apt upgrade linux-image-generic'. 4. Reboot system to load new kernel.
🔧 Temporary Workarounds
Restrict disk removal permissions
linuxPrevent untrusted users from removing disk devices to block exploitation vector.
chmod 640 /sys/block/*/device/delete
setfacl -m u:root:rw /sys/block/*/device/delete
🧯 If You Can't Patch
- Restrict physical and console access to systems
- Implement strict access controls on disk management operations
🔍 How to Verify
Check if Vulnerable:
Check kernel version against vendor advisories; for RHEL: 'rpm -q kernel' and compare to patched versions in RHSA-2024:0412.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update and reboot; check that 'uname -r' shows patched version.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg
- Unexpected disk removal events in system logs
Network Indicators:
- None - local exploitation only
SIEM Query:
source="kernel" AND "panic" OR "Oops" AND "bdi" OR "writeback"
🔗 References
- https://access.redhat.com/errata/RHSA-2024:0412
- https://access.redhat.com/security/cve/CVE-2024-0562
- https://bugzilla.redhat.com/show_bug.cgi?id=2258475
- https://patchwork.kernel.org/project/linux-mm/patch/20220801155034.3772543-1-khazhy@google.com/
- https://access.redhat.com/errata/RHSA-2024:0412
- https://access.redhat.com/security/cve/CVE-2024-0562
- https://bugzilla.redhat.com/show_bug.cgi?id=2258475
- https://patchwork.kernel.org/project/linux-mm/patch/20220801155034.3772543-1-khazhy@google.com/