CVE-2024-47737
nfsd: call cache_put if xdr_reserve_space returns NULL
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL If not enough buffer space available, but idmap_lookup has triggered lookup_fn which calls cache_get and returns successfully. Then we missed to call cache_put here which pairs with cache_get. Reviwed-by: Jeff Layton <[email protected]>
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 3e8081ebff12bec1347deaceb6bce0765cce54df ddd1ea56367202f6c99135cd59de7a97af4c4ffd < c6b16e700cf4d959af524bd9d3978407ff7ce462 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 9f03f0016ff797932551881c7e06ae50e9c39134 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 9803ab882d565a8fb2dde5999d98866d1c499dfd ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 81821617312988096f5deccf0f7da6f888e98056 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < a1afbbb5276f943ad7173d0b4c626b8c75a260da ddd1ea56367202f6c99135cd59de7a97af4c4ffd < e32ee6a61041925d1a05c14d10352dcfce9ef029 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < 8d0765f86135e27f0bb5c950c136495719b4c834 ddd1ea56367202f6c99135cd59de7a97af4c4ffd < d078cbf5c38de83bc31f83c47dcd2184c04a50c7
Linux / Linux
3.16
References
git.kernel.org: https://git.kernel.org/stable/c/3e8081ebff12bec1347deaceb6bce0765cce54df git.kernel.org: https://git.kernel.org/stable/c/c6b16e700cf4d959af524bd9d3978407ff7ce462 git.kernel.org: https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134 git.kernel.org: https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd git.kernel.org: https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056 git.kernel.org: https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da git.kernel.org: https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029 git.kernel.org: https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834 git.kernel.org: https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-398330.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html