CVE-2024-14027
Received Received - Intake
Use-After-Free in Linux Kernel fremovexattr Causes Memory Leak

Publication date: 2026-03-09

Last updated on: 2026-04-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: fs/xattr: missing fdput() in fremovexattr error path In the Linux kernel, the fremovexattr() syscall calls fdget() to acquire a file reference but returns early without calling fdput() when strncpy_from_user() fails on the name argument. In multi-threaded processes where fdget() takes the slow path, this permanently leaks one file reference per call, pinning the struct file and associated kernel objects in memory. An unprivileged local user can exploit this to cause kernel memory exhaustion. The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)").
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's fremovexattr() system call. When fremovexattr() calls fdget() to get a file reference, it may return early without calling fdput() if strncpy_from_user() fails on the name argument. This causes a file reference to be leaked permanently in multi-threaded processes where fdget() takes the slow path, leading to pinned kernel objects in memory.

Essentially, the kernel fails to release a file reference in certain error conditions, which results in a memory leak of kernel objects.


How can this vulnerability impact me? :

An unprivileged local user can exploit this vulnerability to cause kernel memory exhaustion by repeatedly triggering the leak. This can degrade system performance or potentially lead to denial of service by exhausting kernel memory resources.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart