We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-46697

nfsd: ensure that nfsd4_fattr_args.context is zeroed out



Description

In the Linux kernel, the following vulnerability has been resolved: nfsd: ensure that nfsd4_fattr_args.context is zeroed out If nfsd4_encode_fattr4 ends up doing a "goto out" before we get to checking for the security label, then args.context will be set to uninitialized junk on the stack, which we'll then try to free. Initialize it early.

Reserved 2024-09-11 | Published 2024-09-13 | Updated 2024-11-05 | Assigner Linux

Product status

Default status
unaffected

f59388a579c6 before dd65b324174a
affected

f59388a579c6 before f58bab6fd406
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

6.10.8
unaffected

6.11
unaffected

References

git.kernel.org/...c/dd65b324174a64558a16ebbf4c3266e5701185d0

git.kernel.org/...c/f58bab6fd4063913bd8321e99874b8239e9ba726

cve.org (CVE-2024-46697)

nvd.nist.gov (CVE-2024-46697)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-46697

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.