First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag In afs_wait_for_operation(), we set transcribe the call responded flag to the server record that we used after doing the fileserver iteration loop - but it's possible to exit the loop having had a response from the server that we've discarded (e.g. it returned an abort or we started receiving data, but the call didn't complete). This means that op->server might be NULL, but we don't check that before attempting to set the server flag.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-49999 is classified as moderate.
To fix CVE-2024-49999, upgrade the Linux kernel to version 6.10.15 or higher, or apply the recommended security patches.
CVE-2024-49999 affects Linux kernel versions between 6.8 and 6.10.14, as well as version 6.11, and 6.12-rc1.
CVE-2024-49999 affects the AFS (Andrew File System) component of the Linux kernel.
As of now, there is no public information indicating that CVE-2024-49999 is being actively exploited in the wild.