Home

Description

In the Linux kernel, the following vulnerability has been resolved: fs/xattr: missing fdput() in fremovexattr error path In the Linux kernel, the fremovexattr() syscall calls fdget() to acquire a file reference but returns early without calling fdput() when strncpy_from_user() fails on the name argument. In multi-threaded processes where fdget() takes the slow path, this permanently leaks one file reference per call, pinning the struct file and associated kernel objects in memory. An unprivileged local user can exploit this to cause kernel memory exhaustion. The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)").

PUBLISHED Reserved 2026-03-09 | Published 2026-03-09 | Updated 2026-03-09 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a71874379ec8c6e788a61d71b3ad014a8d9a5c08
affected

Default status
affected

6.13 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a71874379ec8c6e788a61d71b3ad014a8d9a5c08

cve.org (CVE-2024-14027)

nvd.nist.gov (CVE-2024-14027)

Download JSON