Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix legacy client tracking initialization Get rid of the nfsd4_legacy_tracking_ops->init() call in check_for_legacy_methods(). That will be handled in the caller (nfsd4_client_tracking_init()). Otherwise, we'll wind up calling nfsd4_legacy_tracking_ops->init() twice, and the second time we'll trigger the BUG_ON() in nfsd4_init_recdir().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.8, < 6.12.22 |
References
- https://git.kernel.org/stable/c/95407304253a4bf03494d921c6913e220c26cc63Patch
- https://git.kernel.org/stable/c/cdd66082b227eb695cbf54b7c121ea032e869981Patch
- https://git.kernel.org/stable/c/de71d4e211eddb670b285a0ea477a299601ce1caPatch
FAQ
What is CVE-2024-58092?
CVE-2024-58092 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: nfsd: fix legacy client tracking initialization Get rid of the nfsd4_legacy_tracking_ops->init() call in check_for_legacy_methods(...
How severe is CVE-2024-58092?
CVE-2024-58092 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-58092?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.