![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26958 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
nfs: fix UAF in direct writes In production we have been hitting the
following warning consistently ------------[ cut here ]------------
refcount_t: underflow; use-after-free. WARNING: CPU: 17 PID: 1800359
at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0 Workqueue:
nfsiod nfs_direct_write_schedule_work [nfs] RIP:
0010:refcount_warn_saturate+0x9c/0xe0 PKRU: 55555554 Call Trace:
|
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26958 https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3 https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3 https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5 https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5 https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95 https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95 https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605 https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605 |