CVE-2024-49875

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-49875
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49875.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49875
Downstream
Related
Published
2024-10-21T18:01:15.434Z
Modified
2025-11-28T02:35:30.907692Z
Summary
nfsd: map the EBADMSG to nfserr_io to avoid warning
Details

In the Linux kernel, the following vulnerability has been resolved:

nfsd: map the EBADMSG to nfserr_io to avoid warning

Ext4 will throw -EBADMSG through ext4_readdir when a checksum error occurs, resulting in the following WARNING.

Fix it by mapping EBADMSG to nfserr_io.

nfsdbufferedreaddir iteratedir // -EBADMSG -74 ext4readdir // .iterateshared ext4dxreaddir ext4htreefilltree htreedirblocktotree ext4readdirblock _ext4readdirblock ext4dirblockcsumverify warnnospaceforcsum _warnnospaceforcsum return ERR_PTR(-EFSBADCRC) // -EBADMSG -74 nfserrno // WARNING

[ 161.115610] ------------[ cut here ]------------ [ 161.116465] nfsd: non-standard errno: -74 [ 161.117315] WARNING: CPU: 1 PID: 780 at fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0 [ 161.118596] Modules linked in: [ 161.119243] CPU: 1 PID: 780 Comm: nfsd Not tainted 5.10.0-00014-g79679361fd5d #138 [ 161.120684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe mu.org 04/01/2014 [ 161.123601] RIP: 0010:nfserrno+0x9d/0xd0 [ 161.124676] Code: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6 05 ce 2b 61 03 01 e8 99 20 d8 00 <0f> 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33 [ 161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286 [ 161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 RDI: fffff520001c5f2a [ 161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827 [ 161.132664] R10: ffffed103ee18304 R11: 0000000000000001 R12: 0000000000000021 [ 161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8 [ 161.135244] FS: 0000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000 [ 161.136695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0 [ 161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 161.141519] PKRU: 55555554 [ 161.142076] Call Trace: [ 161.142575] ? _warn+0x9b/0x140 [ 161.143229] ? nfserrno+0x9d/0xd0 [ 161.143872] ? reportbug+0x125/0x150 [ 161.144595] ? handlebug+0x41/0x90 [ 161.145284] ? excinvalidop+0x14/0x70 [ 161.146009] ? asmexcinvalidop+0x12/0x20 [ 161.146816] ? nfserrno+0x9d/0xd0 [ 161.147487] nfsdbufferedreaddir+0x28b/0x2b0 [ 161.148333] ? nfsd4encodedirentfattr+0x380/0x380 [ 161.149258] ? nfsdbufferedfilldir+0xf0/0xf0 [ 161.150093] ? waitforconcurrentwrites+0x170/0x170 [ 161.151004] ? genericfilellseeksize+0x48/0x160 [ 161.151895] nfsdreaddir+0x132/0x190 [ 161.152606] ? nfsd4encodedirentfattr+0x380/0x380 [ 161.153516] ? nfsdunlink+0x380/0x380 [ 161.154256] ? overridecreds+0x45/0x60 [ 161.155006] nfsd4encodereaddir+0x21a/0x3d0 [ 161.155850] ? nfsd4encodereadlink+0x210/0x210 [ 161.156731] ? writebytestoxdrbuf+0x97/0xe0 [ 161.157598] ? _writebytestoxdrbuf+0xd0/0xd0 [ 161.158494] ? lockdowngrade+0x90/0x90 [ 161.159232] ? nfs4svcdecodevoidarg+0x10/0x10 [ 161.160092] nfsd4encodeoperation+0x15a/0x440 [ 161.160959] nfsd4proccompound+0x718/0xe90 [ 161.161818] nfsddispatch+0x18e/0x2c0 [ 161.162586] svcprocesscommon+0x786/0xc50 [ 161.163403] ? nfsdsvc+0x380/0x380 [ 161.164137] ? svcprintk+0x160/0x160 [ 161.164846] ? svcxprtdoenqueue.part.0+0x365/0x380 [ 161.165808] ? nfsdsvc+0x380/0x380 [ 161.166523] ? rcuiswatching+0x23/0x40 [ 161.167309] svcprocess+0x1a5/0x200 [ 161.168019] nfsd+0x1f5/0x380 [ 161.168663] ? nfsdshutdownthreads+0x260/0x260 [ 161.169554] kthread+0x1c4/0x210 [ 161.170224] ? kthreadinsertworksanitycheck+0x80/0x80 [ 161.171246] retfrom_fork+0x1f/0x30

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49875.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
0ea4333c679f333e23956de743ad17387819d3f2
Fixed
825789ca94602543101045ad3aad19b2b60c6b2a
Fixed
6fe058502f8864649c3d614b06b2235223798f48
Fixed
f7d8ee9db94372b8235f5f22bb24381891594c42
Fixed
c76005adfa93d1a027433331252422078750321f
Fixed
e9cfecca22a36b927a440abc6307efb9e138fed5
Fixed
340e61e44c1d2a15c42ec72ade9195ad525fd048

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.227
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.168
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.113
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.55
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.14
Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.3