First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: NFSD: Limit the number of concurrent async COPY operations Nothing appears to limit the number of concurrent async COPY operations that clients can start. In addition, AFAICT each async COPY can copy an unlimited number of 4MB chunks, so can run for a long time. Thus IMO async COPY can become a DoS vector. Add a restriction mechanism that bounds the number of concurrent background COPY operations. Start simple and try to be fair -- this patch implements a per-namespace limit. An async COPY request that occurs while this limit is exceeded gets NFS4ERR_DELAY. The requesting client can choose to send the request again after a delay or fall back to a traditional read/write style copy. If there is need to make the mechanism more sophisticated, we can visit that in future patches.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49974 has a moderate severity level due to the lack of limits on concurrent async COPY operations in the Linux kernel.
To fix CVE-2024-49974, upgrade the Linux kernel to version 6.10.14 or to the versions that are safe from 6.11 to 6.11.3.
CVE-2024-49974 affects Linux kernel versions prior to 6.10.14 and versions from 6.11 to 6.11.3.
Yes, Debian provides remediation for CVE-2024-49974 in specific versions including 6.1.123-1 and 6.12.15-1.
CVE-2024-49974 is categorized as a concurrency vulnerability relating to the operations in the NFSD of the Linux kernel.