CVE-2024-49960

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's ext4 filesystem driver occurs when mounting fails, allowing a timer to remain active after memory is freed. This can lead to kernel crashes or potential privilege escalation. Systems running vulnerable Linux kernel versions with ext4 filesystem support are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific vulnerable kernel versions with the ext4 bug (check git commits for exact ranges)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using ext4 filesystem. Requires specific error conditions during mount failure.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to kernel-level execution if combined with other vulnerabilities.

🟠

Likely Case

System instability or kernel crash when mounting ext4 filesystems fails under specific error conditions.

🟢

If Mitigated

No impact if patched or if ext4 filesystem mounting doesn't encounter the specific error condition.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger filesystem mount operations.
🏢 Internal Only: MEDIUM - Local users or processes with filesystem mount privileges could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Requires specific error conditions during ext4 mount failure. Discovered by Syzbot fuzzing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing commits 0ce160c5bdb67081a62293028dc85758a8efb22a or later

Vendor Advisory: https://git.kernel.org/stable/c/0ce160c5bdb67081a62293028dc85758a8efb22a

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel.

🔧 Temporary Workarounds

Avoid ext4 mount failures

linux

Ensure ext4 filesystems are healthy and mount operations don't fail

# Use fsck to check filesystem health before mounting
fsck.ext4 -p /dev/sdX

🧯 If You Can't Patch

  • Monitor for ext4 mount failures in system logs
  • Restrict filesystem mount operations to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if it contains the vulnerable ext4 code. Use: uname -r and compare with distribution's vulnerability database.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to one containing the fix commits. Check /proc/version or uname -r.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • ext4 mount failure errors
  • ODEBUG bug reports in kernel logs

Network Indicators:

  • None - local vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "ext4" OR "use-after-free" OR "timer")

🔗 References

📤 Share & Export