
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-49999 affects the Linux kernel's AFS (Andrew File System) implementation. The vulnerability was discovered in the afs_wait_for_operation() function where the server responding flag is set incorrectly. The issue affects Linux kernel versions from 6.8 up to (excluding) 6.10.14 and from 6.11 up to (excluding) 6.11.3, as well as version 6.12-rc1 (NVD).
The vulnerability exists in the afs_wait_for_operation() function where the code attempts to set the server responding flag after completing the fileserver iteration loop. The issue occurs because the code doesn't check if op->server is NULL before attempting to set the server flag. This condition can happen when the loop exits after receiving a response from a server that was discarded, such as when it returned an abort or when data reception started but the call didn't complete (Kernel Patch). The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability can lead to a denial of service condition when op->server is NULL and the code attempts to set the server flag. This could potentially cause system instability or crashes in systems using the AFS filesystem (NVD).
The vulnerability has been fixed in the Linux kernel through a patch that adds a NULL check before setting the server flag. The fix involves modifying the condition to 'if (op->call_responded && op->server)' before setting the AFS_SERVER_FL_RESPONDING flag (Kernel Patch). Users are advised to update their Linux kernel to the latest version that includes this fix.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."