{"uuid": "970944cc-d6b0-47e0-a5cc-b62426a966aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49960", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49960\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix timer use-after-free on failed mount\n\nSyzbot has found an ODEBUG bug in ext4_fill_super\n\nThe del_timer_sync function cancels the s_err_report timer,\nwhich reminds about filesystem errors daily. We should\nguarantee the timer is no longer active before kfree(sbi).\n\nWhen filesystem mounting fails, the flow goes to failed_mount3,\nwhere an error occurs when ext4_stop_mmpd is called, causing\na read I/O failure. This triggers the ext4_handle_error function\nthat ultimately re-arms the timer,\nleaving the s_err_report timer active before kfree(sbi) is called.\n\nFix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.\n\ud83d\udccf Published: 2024-10-21T18:02:13.119Z\n\ud83d\udccf Modified: 2025-05-16T07:25:03.573Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/7aac0c17a8cdf4a3236991c1e60435c6a984076c\n2. https://git.kernel.org/stable/c/22e9b83f0f33bc5a7a3181769d1dccbf021f5b04\n3. https://git.kernel.org/stable/c/cf3196e5e2f36cd80dab91ffae402e13935724bc\n4. https://git.kernel.org/stable/c/9203817ba46ebba7c865c8de2aba399537b6e891\n5. https://git.kernel.org/stable/c/fa78fb51d396f4f2f80f8e96a3b1516f394258be\n6. https://git.kernel.org/stable/c/b85569585d0154d4db1e4f9e3e6a4731d407feb0\n7. https://git.kernel.org/stable/c/0ce160c5bdb67081a62293028dc85758a8efb22a", "creation_timestamp": "2025-05-16T07:34:06.000000Z"}