๐Ÿ” CVE Alert

CVE-2024-47737

UNKNOWN 0.0

nfsd: call cache_put if xdr_reserve_space returns NULL

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL If not enough buffer space available, but idmap_lookup has triggered lookup_fn which calls cache_get and returns successfully. Then we missed to call cache_put here which pairs with cache_get. Reviwed-by: Jeff Layton <[email protected]>

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 3e8081ebff12bec1347deaceb6bce0765cce54df ddd1ea56367202f6c99135cd59de7a97af4c4ffd < c6b16e700cf4d959af524bd9d3978407ff7ce462 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 9f03f0016ff797932551881c7e06ae50e9c39134 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 9803ab882d565a8fb2dde5999d98866d1c499dfd ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 81821617312988096f5deccf0f7da6f888e98056 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < a1afbbb5276f943ad7173d0b4c626b8c75a260da ddd1ea56367202f6c99135cd59de7a97af4c4ffd < e32ee6a61041925d1a05c14d10352dcfce9ef029 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 8d0765f86135e27f0bb5c950c136495719b4c834 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < d078cbf5c38de83bc31f83c47dcd2184c04a50c7
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3e8081ebff12bec1347deaceb6bce0765cce54df git.kernel.org: https://git.kernel.org/stable/c/c6b16e700cf4d959af524bd9d3978407ff7ce462 git.kernel.org: https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134 git.kernel.org: https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd git.kernel.org: https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056 git.kernel.org: https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da git.kernel.org: https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029 git.kernel.org: https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834 git.kernel.org: https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html