#VU98867 Use-after-free in Linux kernel - CVE-2024-49884


Vulnerability identifier: #VU98867

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-49884

CWE-ID: CWE-416

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the ext4_split_extent_at() and ext4_ext_dirty() functions in fs/ext4/extents.c. A local user can escalate privileges on the system.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: All versions


External links
https://git.kernel.org/stable/c/e52f933598b781d291b9297e39c463536da0e185
https://git.kernel.org/stable/c/cafcc1bd62934547c76abf46c6d0d54f135006fe
https://git.kernel.org/stable/c/a5401d4c3e2a3d25643c567d26e6de327774a2c9
https://git.kernel.org/stable/c/8fe117790b37c84c651e2bad9efc0e7fda73c0e3
https://git.kernel.org/stable/c/5d949ea75bb529ea6342e83465938a3b0ac51238
https://git.kernel.org/stable/c/915ac3630488af0ca194dc63b86d99802b4f6e18
https://git.kernel.org/stable/c/c26ab35702f8cd0cdc78f96aa5856bfb77be798f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability