๐Ÿ” CVE Alert

CVE-2024-56740

HIGH 7.8

nfs/localio: must clear res.replen in nfs_local_read_done

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfs/localio: must clear res.replen in nfs_local_read_done Otherwise memory corruption can occur due to NFSv3 LOCALIO reads leaving garbage in res.replen: - nfs3_read_done() copies that into server->read_hdrsize; from there nfs3_proc_read_setup() copies it to args.replen in new requests. - nfs3_xdr_enc_read3args() passes that to rpc_prepare_reply_pages() which includes it in hdrsize for xdr_init_pages, so that rq_rcv_buf contains a ridiculous len. - This is copied to rq_private_buf and xs_read_stream_request() eventually passes the kvec to sock_recvmsg() which receives incoming data into entirely the wrong place. This is easily reproduced with NFSv3 LOCALIO that is servicing reads when it is made to pivot back to using normal RPC. This switch back to using normal NFSv3 with RPC can occur for a few reasons but this issue was exposed with a test that stops and then restarts the NFSv3 server while LOCALIO is performing heavy read IO.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
70ba381e1a431245c137ed597ec6a05991c79bd9 < de5dac261eeab99762bbdf7c20cee5d26ef4462e 70ba381e1a431245c137ed597ec6a05991c79bd9 < 650703bc4ed3edf841e851c99ab8e7ba9e5262a3
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/de5dac261eeab99762bbdf7c20cee5d26ef4462e git.kernel.org: https://git.kernel.org/stable/c/650703bc4ed3edf841e851c99ab8e7ba9e5262a3