We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49999

afs: Fix the setting of the server responding flag



Description

In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag In afs_wait_for_operation(), we set transcribe the call responded flag to the server record that we used after doing the fileserver iteration loop - but it's possible to exit the loop having had a response from the server that we've discarded (e.g. it returned an abort or we started receiving data, but the call didn't complete). This means that op->server might be NULL, but we don't check that before attempting to set the server flag.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

98f9fda2057ba34b720c4d353351024d6dcee90f before 3d51ab44123f35dd1d646d99a15ebef10f55e263
affected

98f9fda2057ba34b720c4d353351024d6dcee90f before 97c953572d98080c5f1486155350bb688041747a
affected

98f9fda2057ba34b720c4d353351024d6dcee90f before ff98751bae40faed1ba9c6a7287e84430f7dec64
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/3d51ab44123f35dd1d646d99a15ebef10f55e263

git.kernel.org/...c/97c953572d98080c5f1486155350bb688041747a

git.kernel.org/...c/ff98751bae40faed1ba9c6a7287e84430f7dec64

cve.org (CVE-2024-49999)

nvd.nist.gov (CVE-2024-49999)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-49999

Support options

Helpdesk Chat, Email, Knowledgebase