๐Ÿ” CVE Alert

CVE-2024-49889

UNKNOWN 0.0

ext4: avoid use-after-free in ext4_ext_show_leaf()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid use-after-free in ext4_ext_show_leaf() In ext4_find_extent(), path may be freed by error or be reallocated, so using a previously saved *ppath may have been freed and thus may trigger use-after-free, as follows: ext4_split_extent path = *ppath; ext4_split_extent_at(ppath) path = ext4_find_extent(ppath) ext4_split_extent_at(ppath) // ext4_find_extent fails to free path // but zeroout succeeds ext4_ext_show_leaf(inode, path) eh = path[depth].p_hdr // path use-after-free !!! Similar to ext4_split_extent_at(), we use *ppath directly as an input to ext4_ext_show_leaf(). Fix a spelling error by the way. Same problem in ext4_ext_handle_unwritten_extents(). Since 'path' is only used in ext4_ext_show_leaf(), remove 'path' and use *ppath directly. This issue is triggered only when EXT_DEBUG is defined and therefore does not affect functionality.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
dfe5080939ea4686b3414b5d970a9b26733c57a4 < b0cb4561fc4284d04e69c8a66c8504928ab2484e dfe5080939ea4686b3414b5d970a9b26733c57a4 < 4999fed877bb64e3e7f9ab9996de2ca983c41928 dfe5080939ea4686b3414b5d970a9b26733c57a4 < 2eba3b0cc5b8de624918d21f32b5b8db59a90b39 dfe5080939ea4686b3414b5d970a9b26733c57a4 < 34b2096380ba475771971a778a478661a791aa15 dfe5080939ea4686b3414b5d970a9b26733c57a4 < 8b114f2cc7dd5d36729d040b68432fbd0f0a8868 dfe5080939ea4686b3414b5d970a9b26733c57a4 < d483c7cc1796bd6a80e7b3a8fd494996260f6b67 dfe5080939ea4686b3414b5d970a9b26733c57a4 < 4e2524ba2ca5f54bdbb9e5153bea00421ef653f5
Linux / Linux
3.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b0cb4561fc4284d04e69c8a66c8504928ab2484e git.kernel.org: https://git.kernel.org/stable/c/4999fed877bb64e3e7f9ab9996de2ca983c41928 git.kernel.org: https://git.kernel.org/stable/c/2eba3b0cc5b8de624918d21f32b5b8db59a90b39 git.kernel.org: https://git.kernel.org/stable/c/34b2096380ba475771971a778a478661a791aa15 git.kernel.org: https://git.kernel.org/stable/c/8b114f2cc7dd5d36729d040b68432fbd0f0a8868 git.kernel.org: https://git.kernel.org/stable/c/d483c7cc1796bd6a80e7b3a8fd494996260f6b67 git.kernel.org: https://git.kernel.org/stable/c/4e2524ba2ca5f54bdbb9e5153bea00421ef653f5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html