๐Ÿ” CVE Alert

CVE-2024-49960

UNKNOWN 0.0

ext4: fix timer use-after-free on failed mount

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ext4: fix timer use-after-free on failed mount Syzbot has found an ODEBUG bug in ext4_fill_super The del_timer_sync function cancels the s_err_report timer, which reminds about filesystem errors daily. We should guarantee the timer is no longer active before kfree(sbi). When filesystem mounting fails, the flow goes to failed_mount3, where an error occurs when ext4_stop_mmpd is called, causing a read I/O failure. This triggers the ext4_handle_error function that ultimately re-arms the timer, leaving the s_err_report timer active before kfree(sbi) is called. Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5e4f5138bd8522ebe231a137682d3857209a2c07 < 7aac0c17a8cdf4a3236991c1e60435c6a984076c 618f003199c6188e01472b03cdbba227f1dc5f24 < 22e9b83f0f33bc5a7a3181769d1dccbf021f5b04 618f003199c6188e01472b03cdbba227f1dc5f24 < cf3196e5e2f36cd80dab91ffae402e13935724bc 618f003199c6188e01472b03cdbba227f1dc5f24 < 9203817ba46ebba7c865c8de2aba399537b6e891 618f003199c6188e01472b03cdbba227f1dc5f24 < fa78fb51d396f4f2f80f8e96a3b1516f394258be 618f003199c6188e01472b03cdbba227f1dc5f24 < b85569585d0154d4db1e4f9e3e6a4731d407feb0 618f003199c6188e01472b03cdbba227f1dc5f24 < 0ce160c5bdb67081a62293028dc85758a8efb22a cecfdb9cf9a700d1037066173abac0617f6788df eb7b40d9d3785f7a131fb0b1f89bb6efa46c1833
Linux / Linux
5.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7aac0c17a8cdf4a3236991c1e60435c6a984076c git.kernel.org: https://git.kernel.org/stable/c/22e9b83f0f33bc5a7a3181769d1dccbf021f5b04 git.kernel.org: https://git.kernel.org/stable/c/cf3196e5e2f36cd80dab91ffae402e13935724bc git.kernel.org: https://git.kernel.org/stable/c/9203817ba46ebba7c865c8de2aba399537b6e891 git.kernel.org: https://git.kernel.org/stable/c/fa78fb51d396f4f2f80f8e96a3b1516f394258be git.kernel.org: https://git.kernel.org/stable/c/b85569585d0154d4db1e4f9e3e6a4731d407feb0 git.kernel.org: https://git.kernel.org/stable/c/0ce160c5bdb67081a62293028dc85758a8efb22a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html