Skip to main content

CVE-2024-49960: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-49960cvecve-2024-49960
Published: Mon Oct 21 2024 (10/21/2024, 18:02:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount Syzbot has found an ODEBUG bug in ext4_fill_super The del_timer_sync function cancels the s_err_report timer, which reminds about filesystem errors daily. We should guarantee the timer is no longer active before kfree(sbi). When filesystem mounting fails, the flow goes to failed_mount3, where an error occurs when ext4_stop_mmpd is called, causing a read I/O failure. This triggers the ext4_handle_error function that ultimately re-arms the timer, leaving the s_err_report timer active before kfree(sbi) is called. Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.

AI-Powered Analysis

AILast updated: 07/04/2025, 05:40:40 UTC

Technical Analysis

CVE-2024-49960 is a vulnerability identified in the Linux kernel's ext4 filesystem implementation. The issue arises from improper handling of a timer object (s_err_report) during a failed mount operation. Specifically, when mounting an ext4 filesystem fails, the kernel executes a cleanup routine (failed_mount3) that calls ext4_stop_mmpd, which leads to a read I/O failure. This failure triggers ext4_handle_error, which inadvertently re-arms the s_err_report timer. However, the timer is still active when the kernel attempts to free the superblock information structure (sbi) via kfree(sbi), resulting in a use-after-free condition on the timer object. This use-after-free bug can cause kernel instability or crashes, potentially leading to denial of service (DoS) conditions. The root cause is that the del_timer_sync function, which is supposed to cancel the timer safely, is not called at the correct point in the failure path. The fix involves ensuring that the s_err_report timer is properly canceled after ext4_stop_mmpd is called, preventing the timer from being active when the associated memory is freed. This vulnerability was discovered by Syzbot, an automated kernel fuzzing system, and affects multiple Linux kernel versions as indicated by the commit hashes. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet. The vulnerability affects the ext4 filesystem, which is widely used in Linux environments for local storage and embedded systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running Linux with ext4 filesystems, which is common in servers, desktops, and embedded devices. Exploitation could lead to kernel crashes and system instability, resulting in denial of service. This can disrupt business operations, especially for critical infrastructure, cloud providers, and enterprises relying on Linux-based servers. While the vulnerability does not directly expose data confidentiality or integrity issues, the resulting DoS could impact availability of services. Organizations running containerized workloads or virtualized environments on Linux hosts with ext4 may also experience cascading effects if hosts become unstable. The absence of known exploits reduces immediate risk, but the vulnerability’s presence in the kernel means that attackers with local access or the ability to trigger mount failures could exploit it. European organizations with strict uptime requirements or those in sectors like finance, healthcare, and telecommunications should prioritize patching to avoid service disruptions.

Mitigation Recommendations

1. Apply the official Linux kernel patches that address CVE-2024-49960 as soon as they become available from trusted sources or Linux distribution vendors. 2. For organizations using custom or long-term support kernels, backport the fix to maintain stability. 3. Monitor system logs for ext4 mount failures or unusual kernel timer activity that could indicate attempts to trigger this vulnerability. 4. Limit local user access and restrict the ability to mount filesystems to trusted administrators to reduce exploitation risk. 5. Employ kernel hardening techniques such as kernel lockdown modes and seccomp filters to limit attack surface. 6. Regularly update and audit Linux kernel versions and filesystem drivers to ensure timely application of security fixes. 7. In environments where immediate patching is not feasible, consider isolating vulnerable systems or using alternative filesystems temporarily to mitigate risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.049Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec065

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:40:40 AM

Last updated: 8/6/2025, 3:37:19 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats