xattr: switch to CLASS(fd)
Summary
| CVE | CVE-2024-14027 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-09 16:16:14 UTC |
| Updated | 2026-04-02 12:16:17 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: fs/xattr: missing fdput() in fremovexattr error path In the Linux kernel, the fremovexattr() syscall calls fdget() to acquire a file reference but returns early without calling fdput() when strncpy_from_user() fails on the name argument. In multi-threaded processes where fdget() takes the slow path, this permanently leaks one file reference per call, pinning the struct file and associated kernel objects in memory. An unprivileged local user can exploit this to cause kernel memory exhaustion. The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)"). |
Risk And Classification
EPSS: 0.000090000 probability, percentile 0.009320000 (date 2026-04-02)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected c03185f4a23e7f89d84c9981091770e876e64480 5a1e865e51063d6c56f673ec8ad4b6604321b455 git | Not specified |
| CNA | Linux | Linux | affected c3a5e3e872f3688ae0dc57bb78ca633921d96a91 d151b94967c8247005435b63fc60f8f4baa320da git | Not specified |
| CNA | Linux | Linux | affected c3a5e3e872f3688ae0dc57bb78ca633921d96a91 a71874379ec8c6e788a61d71b3ad014a8d9a5c08 git | Not specified |
| CNA | Linux | Linux | affected 8d5863cb33aa424fc27115ee945ad6b96ae2facb git | Not specified |
| CNA | Linux | Linux | affected 6.11 | Not specified |
| CNA | Linux | Linux | unaffected 6.11 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.131 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.77 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.13 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/5a1e865e51063d6c56f673ec8ad4b6604321b455 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/d151b94967c8247005435b63fc60f8f4baa320da | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/a71874379ec8c6e788a61d71b3ad014a8d9a5c08 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.