Release Date: | 2024-10-21 |
In the Linux kernel, the following vulnerability has been resolved:\next4: avoid use-after-free in ext4_ext_show_leaf()\nIn ext4_find_extent(), path may be freed by error or be reallocated, so\nusing a previously saved *ppath may have been freed and thus may trigger\nuse-after-free, as follows:\next4_split_extent\npath = *ppath;\next4_split_extent_at(ppath)\npath = ext4_find_extent(ppath)\next4_split_extent_at(ppath)\n// ext4_find_extent fails to free path\n// but zeroout succeeds\next4_ext_show_leaf(inode, path)\neh = path[depth].p_hdr\n// path use-after-free !!!\nSimilar to ext4_split_extent_at(), we use *ppath directly as an input to\next4_ext_show_leaf(). Fix a spelling error by the way.\nSame problem in ext4_ext_handle_unwritten_extents(). Since 'path' is only\nused in ext4_ext_show_leaf(), remove 'path' and use *ppath directly.\nThis issue is triggered only when EXT_DEBUG is defined and therefore does\nnot affect functionality.
See more information about CVE-2024-49889 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 6.7 |
Vector String: | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Version: | 3.1 |
Attack Vector: | Local |
Attack Complexity: | Low |
Privileges Required: | High |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality: | High |
Integrity: | High |
Availability: | High |
Platform | Errata | Release Date |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
Oracle Linux version 9 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: