cve/2024/CVE-2024-49889.md

19 lines
1.5 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-49889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:ext4: avoid use-after-free in ext4_ext_show_leaf()In ext4_find_extent(), path may be freed by error or be reallocated, sousing a previously saved *ppath may have been freed and thus may triggeruse-after-free, as follows:ext4_split_extent path = *ppath; ext4_split_extent_at(ppath) path = ext4_find_extent(ppath) ext4_split_extent_at(ppath) // ext4_find_extent fails to free path // but zeroout succeeds ext4_ext_show_leaf(inode, path) eh = path[depth].p_hdr // path use-after-free !!!Similar to ext4_split_extent_at(), we use *ppath directly as an input toext4_ext_show_leaf(). Fix a spelling error by the way.Same problem in ext4_ext_handle_unwritten_extents(). Since 'path' is onlyused in ext4_ext_show_leaf(), remove 'path' and use *ppath directly.This issue is triggered only when EXT_DEBUG is defined and therefore doesnot affect functionality.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/w4zu/Debian_security