
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's Network File System (NFS) server daemon has been identified as CVE-2024-35914. The issue was discovered in the error cleanup path of the nfsd_rename() function. Specifically, a commit (a8b0026847b8) that was intended to avoid deadlocks in cases where parents have no common ancestor introduced an error bail out path that failed to properly drop the remount protection after acquisition (Kernel Git).
The vulnerability stems from an improper cleanup mechanism in the nfsdrename() function within the Linux kernel's NFS server implementation. When the error bail out path is triggered, the code fails to release the acquired remount protection, potentially leading to resource management issues. The fix involves modifying the cleanup path to ensure proper release of the remount protection by adding a goto outwant_write statement instead of the previous goto out (Kernel Git).
The vulnerability affects various Linux distributions and has been addressed in several kernel versions. Ubuntu has marked this as a medium priority issue and has released fixes for multiple kernel variants including linux-gke (6.8.0-1006.9), linux-nvidia (6.8.0-1009.9), and other kernel packages (Ubuntu Security).
The vulnerability has been fixed in various Linux kernel versions. Ubuntu has released patches for affected systems, including version 6.8.0-38.38 for Ubuntu 24.04 LTS (noble). Users are advised to update their systems to the patched versions. For Ubuntu systems, this requires a system reboot after applying the updates to implement all necessary changes (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."