First published: Fri Sep 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nfsd: ensure that nfsd4_fattr_args.context is zeroed out If nfsd4_encode_fattr4 ends up doing a "goto out" before we get to checking for the security label, then args.context will be set to uninitialized junk on the stack, which we'll then try to free. Initialize it early.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.7<6.10.8 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46697 is considered a moderate severity vulnerability affecting the Linux kernel.
To fix CVE-2024-46697, you should upgrade to the latest patched version of the Linux kernel, specifically 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, or 6.12.11-1.
CVE-2024-46697 affects Linux kernel versions between 6.7 and 6.10.8, and the 6.11 release candidate versions.
CVE-2024-46697 specifically affects the nfsd component of the Linux kernel.
If left unpatched, CVE-2024-46697 could lead to information leakage due to the use of uninitialized memory in the nfsd component.