CVE-2024-49999
afs: Fix the setting of the server responding flag
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: afs: Fix the setting of the server responding flag In afs_wait_for_operation(), we set transcribe the call responded flag to the server record that we used after doing the fileserver iteration loop - but it's possible to exit the loop having had a response from the server that we've discarded (e.g. it returned an abort or we started receiving data, but the call didn't complete). This means that op->server might be NULL, but we don't check that before attempting to set the server flag.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
98f9fda2057ba34b720c4d353351024d6dcee90f < 3d51ab44123f35dd1d646d99a15ebef10f55e263 98f9fda2057ba34b720c4d353351024d6dcee90f < 97c953572d98080c5f1486155350bb688041747a 98f9fda2057ba34b720c4d353351024d6dcee90f < ff98751bae40faed1ba9c6a7287e84430f7dec64
Linux / Linux
6.8