In the Linux kernel, the following vulnerability has been resolved:
nfsd: call cache_put if xdr_reserve_space returns NULL
If not enough buffer space available, but idmap_lookup has triggered
lookup_fn which calls cache_get and returns successfully. Then we
missed to call cache_put here which pairs with cache_get.
Reviwed-by: Jeff Layton <jlayton@kernel.org>
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Nov 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Oct 2024, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/81821617312988096f5deccf0f7da6f888e98056 - Patch | |
| References | () https://git.kernel.org/stable/c/8d0765f86135e27f0bb5c950c136495719b4c834 - Patch | |
| References | () https://git.kernel.org/stable/c/9803ab882d565a8fb2dde5999d98866d1c499dfd - Patch | |
| References | () https://git.kernel.org/stable/c/9f03f0016ff797932551881c7e06ae50e9c39134 - Patch | |
| References | () https://git.kernel.org/stable/c/a1afbbb5276f943ad7173d0b4c626b8c75a260da - Patch | |
| References | () https://git.kernel.org/stable/c/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 - Patch | |
| References | () https://git.kernel.org/stable/c/e32ee6a61041925d1a05c14d10352dcfce9ef029 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 |
21 Oct 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-21 13:15
Updated : 2025-11-03 23:16
NVD link : CVE-2024-47737
Mitre link : CVE-2024-47737
CVE.ORG link : CVE-2024-47737
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
