CVE-2024-49960
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ext4: fix timer use-after-free on failed mount<br />
<br />
Syzbot has found an ODEBUG bug in ext4_fill_super<br />
<br />
The del_timer_sync function cancels the s_err_report timer,<br />
which reminds about filesystem errors daily. We should<br />
guarantee the timer is no longer active before kfree(sbi).<br />
<br />
When filesystem mounting fails, the flow goes to failed_mount3,<br />
where an error occurs when ext4_stop_mmpd is called, causing<br />
a read I/O failure. This triggers the ext4_handle_error function<br />
that ultimately re-arms the timer,<br />
leaving the s_err_report timer active before kfree(sbi) is called.<br />
<br />
Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.55 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.14 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ce160c5bdb67081a62293028dc85758a8efb22a
- https://git.kernel.org/stable/c/22e9b83f0f33bc5a7a3181769d1dccbf021f5b04
- https://git.kernel.org/stable/c/7aac0c17a8cdf4a3236991c1e60435c6a984076c
- https://git.kernel.org/stable/c/9203817ba46ebba7c865c8de2aba399537b6e891
- https://git.kernel.org/stable/c/b85569585d0154d4db1e4f9e3e6a4731d407feb0
- https://git.kernel.org/stable/c/cf3196e5e2f36cd80dab91ffae402e13935724bc
- https://git.kernel.org/stable/c/fa78fb51d396f4f2f80f8e96a3b1516f394258be
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



