CVE-2024-47737

In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL If not enough buffer space available, but idmap_lookup has triggered lookup_fn which calls cache_get and returns successfully. Then we missed to call cache_put here which pairs with cache_get. Reviwed-by: Jeff Layton <jlayton@kernel.org>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3e8081ebff12bec1347deaceb6bce0765cce54df -
  • () https://git.kernel.org/stable/c/c6b16e700cf4d959af524bd9d3978407ff7ce462 -

23 Oct 2024, 17:00

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: llamar a cache_put si xdr_reserve_space devuelve NULL Si no hay suficiente espacio de búfer disponible, pero idmap_lookup ha activado lookup_fn que llama a cache_get y devuelve correctamente. Entonces, nos olvidamos de llamar a cache_put aquí, que se empareja con cache_get. Revisado por: Jeff Layton
References () https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056 - () https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056 - Patch
References () https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834 - () https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834 - Patch
References () https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd - () https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd - Patch
References () https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134 - () https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134 - Patch
References () https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da - () https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da - Patch
References () https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 - () https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 - Patch
References () https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029 - () https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-47737

Mitre link : CVE-2024-47737

CVE.ORG link : CVE-2024-47737


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference