CVE-2024-53066
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nfs: Fix KMSAN warning in decode_getfattr_attrs()<br />
<br />
Fix the following KMSAN warning:<br />
<br />
CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B<br />
Tainted: [B]=BAD_PAGE<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)<br />
=====================================================<br />
=====================================================<br />
BUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90<br />
decode_getfattr_attrs+0x2d6d/0x2f90<br />
decode_getfattr_generic+0x806/0xb00<br />
nfs4_xdr_dec_getattr+0x1de/0x240<br />
rpcauth_unwrap_resp_decode+0xab/0x100<br />
rpcauth_unwrap_resp+0x95/0xc0<br />
call_decode+0x4ff/0xb50<br />
__rpc_execute+0x57b/0x19d0<br />
rpc_execute+0x368/0x5e0<br />
rpc_run_task+0xcfe/0xee0<br />
nfs4_proc_getattr+0x5b5/0x990<br />
__nfs_revalidate_inode+0x477/0xd00<br />
nfs_access_get_cached+0x1021/0x1cc0<br />
nfs_do_access+0x9f/0xae0<br />
nfs_permission+0x1e4/0x8c0<br />
inode_permission+0x356/0x6c0<br />
link_path_walk+0x958/0x1330<br />
path_lookupat+0xce/0x6b0<br />
filename_lookup+0x23e/0x770<br />
vfs_statx+0xe7/0x970<br />
vfs_fstatat+0x1f2/0x2c0<br />
__se_sys_newfstatat+0x67/0x880<br />
__x64_sys_newfstatat+0xbd/0x120<br />
x64_sys_call+0x1826/0x3cf0<br />
do_syscall_64+0xd0/0x1b0<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
The KMSAN warning is triggered in decode_getfattr_attrs(), when calling<br />
decode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not<br />
initialized.<br />
<br />
Fix the issue by initializing fattr->mdsthreshold to NULL in<br />
nfs_fattr_init().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.5 (including) | 4.19.324 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.286 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.230 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.172 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.117 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/25ffd294fef81a7f3cd9528adf21560c04d98747
- https://git.kernel.org/stable/c/8fc5ea9231af9122d227c9c13f5e578fca48d2e3
- https://git.kernel.org/stable/c/9b453e8b108a5a93a6e348cf2ba4c9c138314a00
- https://git.kernel.org/stable/c/9be0a21ae52b3b822d0eec4d14e909ab394f8a92
- https://git.kernel.org/stable/c/bbfcd261cc068fe1cd02a4e871275074a0daa4e2
- https://git.kernel.org/stable/c/dc270d7159699ad6d11decadfce9633f0f71c1db
- https://git.kernel.org/stable/c/f6b2b2b981af8e7d7c62d34143acefa4e1edfe8b
- https://git.kernel.org/stable/c/f749cb60a01f8391c760a1d6ecd938cadacf9549
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



