
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-46697 affects the Linux kernel's Network File System daemon (nfsd) component. The vulnerability was discovered in the nfsd4fattrargs.context handling where uninitialized stack contents could be accessed if nfsd4encodefattr4 performs a 'goto out' before checking the security label. The issue affects Linux kernel versions from 6.7 up to (excluding) 6.10.8 (NVD).
The vulnerability stems from improper initialization of the nfsd4fattrargs.context variable. If nfsd4encodefattr4 function executes a 'goto out' before checking the security label, args.context would contain uninitialized data from the stack, which would then be attempted to be freed. This could potentially lead to memory corruption issues. The CVSS v3.1 base score is 5.5 (Medium) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability could lead to system instability or crashes due to attempts to free uninitialized memory. The CVSS scoring indicates that while the vulnerability requires local access and low privileges, it could have a high impact on system availability (NVD).
The vulnerability has been fixed by initializing args.context to NULL early in the function. The fix has been implemented in various Linux distributions including Ubuntu 24.04 LTS (noble) with kernel version 6.8.0-50.51 and Red Hat Enterprise Linux 9 (Ubuntu Security, Red Hat). Users are advised to update their systems to the patched versions.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."