In the Linux kernel, the following vulnerability has been resolved:
NFSD: Prevent NULL dereference in nfsd4processcb_update()
@ses is initialized to NULL. If __nfsd4findbackchannel() finds no available backchannel session, setupcallbackclient() will try to dereference @ses and segfault.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53217.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53217.json"
[
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4callback.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a4ffc1aa9d618e41ad9151f40966e402e58a5a2",
"deprecated": false,
"digest": {
"line_hashes": [
"31052924344114353414932402071072310374",
"170774473135662711514849529967715334141",
"110572066548561217731155461460779830307",
"278964024127058929074654096330172944938"
],
"threshold": 0.9
},
"id": "CVE-2024-53217-2f2f0030",
"signature_type": "Line"
},
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4callback.c",
"function": "nfsd4_process_cb_update"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@752a75811f27300fe8131b0a1efc91960f6f88e7",
"deprecated": false,
"digest": {
"function_hash": "102099946615391371360066142389638561240",
"length": 997.0
},
"id": "CVE-2024-53217-4bb01899",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4callback.c",
"function": "nfsd4_process_cb_update"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4a4ffc1aa9d618e41ad9151f40966e402e58a5a2",
"deprecated": false,
"digest": {
"function_hash": "65848670805217667456421821995011667542",
"length": 1045.0
},
"id": "CVE-2024-53217-70c530ae",
"signature_type": "Function"
},
{
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4callback.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@752a75811f27300fe8131b0a1efc91960f6f88e7",
"deprecated": false,
"digest": {
"line_hashes": [
"31052924344114353414932402071072310374",
"170774473135662711514849529967715334141",
"110572066548561217731155461460779830307",
"162592903211723373875119740234703493110"
],
"threshold": 0.9
},
"id": "CVE-2024-53217-96deb0f5",
"signature_type": "Line"
}
]