CVE-2024-49960Use After Free in Linux

CWE-416Use After Free56 documents7 sources
Severity
7.8HIGHNVD
OSV8.8
EPSS
0.0%
top 98.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 21
Latest updateSep 2

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount Syzbot has found an ODEBUG bug in ext4_fill_super The del_timer_sync function cancels the s_err_report timer, which reminds about filesystem errors daily. We should guarantee the timer is no longer active before kfree(sbi). When filesystem mounting fails, the flow goes to failed_mount3, where an error occurs when ext4_stop_mmpd is called, causing a read I/O failure. This trigger

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages11 packages

Patches

🔴Vulnerability Details

27
OSV
linux-azure-5.15 vulnerabilities2025-09-02
OSV
linux-azure-fips vulnerabilities2025-08-22
OSV
linux-azure vulnerabilities2025-08-22
OSV
linux-raspi vulnerabilities2025-08-05
OSV
linux-xilinx-zynqmp vulnerabilities2025-07-29

📋Vendor Advisories

28
Ubuntu
Linux kernel (Azure) vulnerabilities2025-09-02
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Azure) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-08-05
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-07-29
CVE-2024-49960 — Use After Free in Linux | cvebase