In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix legacy client tracking initialization
Get rid of the nfsd4legacytrackingops->init() call in checkforlegacymethods(). That will be handled in the caller (nfsd4clienttrackinginit()). Otherwise, we'll wind up calling nfsd4legacytrackingops->init() twice, and the second time we'll trigger the BUGON() in nfsd4init_recdir().
[
{
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cdd66082b227eb695cbf54b7c121ea032e869981",
"digest": {
"line_hashes": [
"248998771022695820791056752359058980036",
"12979914391309238762546230491907764497",
"29487717997076717663390075316034589593",
"250572855638754651219643733864045680949"
],
"threshold": 0.9
},
"id": "CVE-2024-58092-0a2f70c1",
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4recover.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de71d4e211eddb670b285a0ea477a299601ce1ca",
"digest": {
"line_hashes": [
"248998771022695820791056752359058980036",
"12979914391309238762546230491907764497",
"29487717997076717663390075316034589593",
"250572855638754651219643733864045680949"
],
"threshold": 0.9
},
"id": "CVE-2024-58092-2ebfdaed",
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4recover.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95407304253a4bf03494d921c6913e220c26cc63",
"digest": {
"length": 565.0,
"function_hash": "79365730838626736674734948717412779682"
},
"id": "CVE-2024-58092-3cc1e114",
"signature_version": "v1",
"target": {
"function": "check_for_legacy_methods",
"file": "fs/nfsd/nfs4recover.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de71d4e211eddb670b285a0ea477a299601ce1ca",
"digest": {
"length": 565.0,
"function_hash": "79365730838626736674734948717412779682"
},
"id": "CVE-2024-58092-4f54c895",
"signature_version": "v1",
"target": {
"function": "check_for_legacy_methods",
"file": "fs/nfsd/nfs4recover.c"
}
},
{
"signature_type": "Function",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cdd66082b227eb695cbf54b7c121ea032e869981",
"digest": {
"length": 565.0,
"function_hash": "79365730838626736674734948717412779682"
},
"id": "CVE-2024-58092-8fef93c3",
"signature_version": "v1",
"target": {
"function": "check_for_legacy_methods",
"file": "fs/nfsd/nfs4recover.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@95407304253a4bf03494d921c6913e220c26cc63",
"digest": {
"line_hashes": [
"248998771022695820791056752359058980036",
"12979914391309238762546230491907764497",
"29487717997076717663390075316034589593",
"250572855638754651219643733864045680949"
],
"threshold": 0.9
},
"id": "CVE-2024-58092-e4951428",
"signature_version": "v1",
"target": {
"file": "fs/nfsd/nfs4recover.c"
}
}
]