vulnerability
Amazon Linux AMI 2: CVE-2024-49960: Security patch for kernel, kernel-livepatch-5.10.227-219.884, kernel-livepatch-5.10.228-219.884, kernel-livepatch-5.10.230-223.885, kernel-livepatch-5.10.233-223.887 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Oct 21, 2024 | Feb 4, 2025 | Mar 26, 2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix timer use-after-free on failed mount
Syzbot has found an ODEBUG bug in ext4_fill_super
The del_timer_sync function cancels the s_err_report timer,
which reminds about filesystem errors daily. We should
guarantee the timer is no longer active before kfree(sbi).
When filesystem mounting fails, the flow goes to failed_mount3,
where an error occurs when ext4_stop_mmpd is called, causing
a read I/O failure. This triggers the ext4_handle_error function
that ultimately re-arms the timer,
leaving the s_err_report timer active before kfree(sbi) is called.
Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
Solutions
References
- AMAZON-AL2/ALAS-2025-2800
- AMAZON-AL2/ALASKERNEL-5.10-2025-083
- AMAZON-AL2/ALASKERNEL-5.15-2025-063
- AMAZON-AL2/ALASKERNEL-5.4-2025-094
- AMAZON-AL2/ALASLIVEPATCH-2025-195
- AMAZON-AL2/ALASLIVEPATCH-2025-196
- AMAZON-AL2/ALASLIVEPATCH-2025-197
- AMAZON-AL2/ALASLIVEPATCH-2025-198
- CVE-2024-49960
- https://attackerkb.com/topics/CVE-2024-49960
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.