CVE-2024-49966
📋 TL;DR
This CVE describes a use-after-free vulnerability in the Linux kernel's OCFS2 filesystem quota handling. When an error occurs during global quota reading, the system fails to properly cancel a scheduled work item before freeing memory, potentially leading to kernel memory corruption. This affects Linux systems using the OCFS2 filesystem with quota support enabled.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, or potential privilege escalation if an attacker can trigger the condition and control memory corruption.
Likely Case
System crash or kernel panic causing denial of service when the specific error condition is triggered during quota operations.
If Mitigated
No impact if OCFS2 filesystem is not used or quota support is disabled.
🎯 Exploit Status
Exploitation requires triggering specific error conditions in OCFS2 quota handling, which may require local access and specific permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel trees (commits referenced in CVE)
Vendor Advisory: https://git.kernel.org/stable/c/0d707a33c84b371cb66120e198eed3374726ddd8
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable OCFS2 quota support
linuxPrevent use of OCFS2 filesystem quota functionality
# Remove quota mount options from OCFS2 filesystems in /etc/fstab
# Ensure no OCFS2 filesystems are mounted with usrquota,grpquota options
Avoid OCFS2 usage
linuxUse alternative filesystems instead of OCFS2
# Migrate data from OCFS2 to alternative filesystem like ext4, xfs
🧯 If You Can't Patch
- Disable OCFS2 filesystem usage entirely
- Implement strict access controls to prevent unauthorized users from triggering quota operations
🔍 How to Verify
Check if Vulnerable:
Check if OCFS2 filesystems are mounted: mount | grep ocfs2. Check kernel version against patched versions from your distribution.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version. Check that OCFS2 modules load without errors.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- ODEBUG warnings about timer_list objects
- OCFS2 quota-related errors in dmesg
Network Indicators:
- None - local vulnerability
SIEM Query:
source="kernel" AND ("ODEBUG" OR "timer_list" OR "qsync_work_fn" OR "ocfs2" AND "panic")
🔗 References
- https://git.kernel.org/stable/c/0d707a33c84b371cb66120e198eed3374726ddd8
- https://git.kernel.org/stable/c/14114d8148db07e7946fb06b56a50cfa425e26c7
- https://git.kernel.org/stable/c/35fccce29feb3706f649726d410122dd81b92c18
- https://git.kernel.org/stable/c/4173d1277c00baeedaaca76783e98b8fd0e3c08d
- https://git.kernel.org/stable/c/89043e7ed63c7fc141e68ea5a79758ed24b6c699
- https://git.kernel.org/stable/c/a4346c04d055bf7e184c18a73dbd23b6a9811118
- https://git.kernel.org/stable/c/bbf41277df8b33fbedf4750a9300c147e8f104eb
- https://git.kernel.org/stable/c/ef768020366f47d23f39c4f57bcb03af6d1e24b3
- https://git.kernel.org/stable/c/fc5cc716dfbdc5fd5f373ff3b51358174cf88bfc
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html