VYPR
Unrated severityNVD Advisory· Published Mar 9, 2026· Updated Apr 6, 2026

CVE-2024-14027

CVE-2024-14027

Description

In the Linux kernel, the following vulnerability has been resolved:

fs/xattr: missing fdput() in fremovexattr error path

In the Linux kernel, the fremovexattr() syscall calls fdget() to acquire a file reference but returns early without calling fdput() when strncpy_from_user() fails on the name argument. In multi-threaded processes where fdget() takes the slow path, this permanently leaks one file reference per call, pinning the struct file and associated kernel objects in memory. An unprivileged local user can exploit this to cause kernel memory exhaustion. The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)").

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Vulnerability

The Linux kernel's fremovexattr() syscall contains a resource leak in its error path. When strncpy_from_user() fails while copying the extended attribute name from userspace, the function returns early without calling fdput() to release the file reference acquired by fdget(). This omission means that the reference count on the struct file is not decremented, permanently pinning the file and its associated kernel objects in memory.

Exploitation

An unprivileged local user can trigger this bug by repeatedly calling fremovexattr() with an invalid or excessively long name argument that causes strncpy_from_user() to fail. In multi-threaded processes where fdget() takes the slow path (e.g., when the file descriptor table is shared), each failed call leaks one file reference. The attacker does not require any special capabilities or authentication beyond the ability to execute code on the system.

Impact

By repeatedly exploiting this leak, an attacker can exhaust kernel memory, leading to denial of service (system instability, out-of-memory conditions, or crashes). The vulnerability does not provide any privilege escalation or data corruption; its sole impact is resource exhaustion.

Mitigation

The issue was inadvertently fixed by commit a71874379ec8 ("xattr: switch to CLASS(fd)") [1], which refactored the xattr syscalls to use the CLASS(fd) pattern that automatically handles cleanup. Users should apply the latest stable kernel updates containing this commit to their Linux kernel. No workaround is available for unpatched systems.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

2

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.