CVE-2024-49999

In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag In afs_wait_for_operation(), we set transcribe the call responded flag to the server record that we used after doing the fileserver iteration loop - but it's possible to exit the loop having had a response from the server that we've discarded (e.g. it returned an abort or we started receiving data, but the call didn't complete). This means that op->server might be NULL, but we don't check that before attempting to set the server flag.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Oct 2024, 18:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/3d51ab44123f35dd1d646d99a15ebef10f55e263 - () https://git.kernel.org/stable/c/3d51ab44123f35dd1d646d99a15ebef10f55e263 - Patch
References () https://git.kernel.org/stable/c/ff98751bae40faed1ba9c6a7287e84430f7dec64 - () https://git.kernel.org/stable/c/ff98751bae40faed1ba9c6a7287e84430f7dec64 - Patch
References () https://git.kernel.org/stable/c/97c953572d98080c5f1486155350bb688041747a - () https://git.kernel.org/stable/c/97c953572d98080c5f1486155350bb688041747a - Patch

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-10-29 18:03


NVD link : CVE-2024-49999

Mitre link : CVE-2024-49999


JSON object : View

Products Affected

linux

  • linux_kernel