CVE-2024-46682: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: nfsd: prevent panic for nfsv4.0 closed files in nfs4_show_open Prior to commit 3f29cc82a84c ("nfsd: split sc_status out of sc_type") states_show() relied on sc_type field to be of valid type before calling into a subfunction to show content of a particular stateid. From that commit, we split the validity of the stateid into sc_status and no longer changed sc_type to 0 while unhashing the stateid. This resulted in kernel oopsing for nfsv4.0 opens that stay around and in nfs4_show_open() would derefence sc_file which was NULL. Instead, for closed open stateids forgo displaying information that relies of having a valid sc_file. To reproduce: mount the server with 4.0, read and close a file and then on the server cat /proc/fs/nfsd/clients/2/states [ 513.590804] Call trace: [ 513.590925] _raw_spin_lock+0xcc/0x160 [ 513.591119] nfs4_show_open+0x78/0x2c0 [nfsd] [ 513.591412] states_show+0x44c/0x488 [nfsd] [ 513.591681] seq_read_iter+0x5d8/0x760 [ 513.591896] seq_read+0x188/0x208 [ 513.592075] vfs_read+0x148/0x470 [ 513.592241] ksys_read+0xcc/0x178
AI Analysis
Technical Summary
CVE-2024-46682 is a vulnerability in the Linux kernel's NFS server daemon (nfsd) related to the handling of NFSv4.0 open state identifiers (stateids). The issue arises from a change introduced in commit 3f29cc82a84c, which split the sc_status field out of sc_type in the kernel's internal stateid structure. Previously, the states_show() function relied on sc_type being valid before accessing subfunctions that display stateid content. After the change, sc_type was no longer reset to zero during stateid unhashing, causing the nfs4_show_open() function to dereference a NULL pointer (sc_file) when processing closed open stateids. This results in a kernel oops (panic) when reading the NFS server's client state information, specifically when accessing /proc/fs/nfsd/clients/2/states on the server. The vulnerability can be triggered by mounting the server with NFSv4.0, reading and closing a file, and then querying the state information, which leads to a kernel crash. The root cause is improper handling of closed open stateids that lack a valid sc_file pointer, leading to a NULL pointer dereference. The fix involves skipping the display of information that requires a valid sc_file for closed open stateids, preventing the kernel panic. This vulnerability affects Linux kernel versions containing the specified commit and is relevant to systems running NFSv4.0 servers. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based NFSv4.0 servers, this vulnerability can cause denial of service (DoS) conditions due to kernel panics triggered by local or potentially remote queries of NFS client state information. The impact primarily affects availability, as the kernel panic will crash the NFS server, disrupting file sharing services critical for enterprise operations, data centers, and cloud infrastructure. Confidentiality and integrity impacts are minimal since the vulnerability does not allow privilege escalation or unauthorized data access directly. However, the resulting service outages could impact business continuity and operational efficiency. Organizations with heavy reliance on NFS for file storage, especially in sectors like finance, manufacturing, research, and government, may experience significant disruption. The vulnerability requires specific conditions to trigger (NFSv4.0 usage, reading and closing files, and querying state info), so the attack surface is somewhat limited but still relevant for environments using this protocol version. The lack of known exploits reduces immediate risk but does not eliminate the threat of exploitation by skilled attackers or accidental triggering by system administrators.
Mitigation Recommendations
1. Apply the official Linux kernel patch that addresses CVE-2024-46682 as soon as it becomes available to prevent kernel panics caused by this vulnerability. 2. If patching is not immediately possible, consider disabling or limiting access to the /proc/fs/nfsd/clients/*/states interface to trusted administrators only, reducing the risk of accidental or malicious triggering. 3. Monitor kernel logs and system stability closely for signs of unexpected panics related to nfsd, especially after NFSv4.0 file operations. 4. Review and restrict NFSv4.0 usage where feasible, potentially migrating to NFSv4.1 or later versions that may not be affected. 5. Implement robust system monitoring and alerting to detect and respond quickly to service disruptions caused by kernel panics. 6. Educate system administrators about the vulnerability and safe handling of NFS client state information to avoid inadvertent triggering. 7. Employ kernel live patching solutions if available to apply fixes without downtime in critical environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-46682: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: nfsd: prevent panic for nfsv4.0 closed files in nfs4_show_open Prior to commit 3f29cc82a84c ("nfsd: split sc_status out of sc_type") states_show() relied on sc_type field to be of valid type before calling into a subfunction to show content of a particular stateid. From that commit, we split the validity of the stateid into sc_status and no longer changed sc_type to 0 while unhashing the stateid. This resulted in kernel oopsing for nfsv4.0 opens that stay around and in nfs4_show_open() would derefence sc_file which was NULL. Instead, for closed open stateids forgo displaying information that relies of having a valid sc_file. To reproduce: mount the server with 4.0, read and close a file and then on the server cat /proc/fs/nfsd/clients/2/states [ 513.590804] Call trace: [ 513.590925] _raw_spin_lock+0xcc/0x160 [ 513.591119] nfs4_show_open+0x78/0x2c0 [nfsd] [ 513.591412] states_show+0x44c/0x488 [nfsd] [ 513.591681] seq_read_iter+0x5d8/0x760 [ 513.591896] seq_read+0x188/0x208 [ 513.592075] vfs_read+0x148/0x470 [ 513.592241] ksys_read+0xcc/0x178
AI-Powered Analysis
Technical Analysis
CVE-2024-46682 is a vulnerability in the Linux kernel's NFS server daemon (nfsd) related to the handling of NFSv4.0 open state identifiers (stateids). The issue arises from a change introduced in commit 3f29cc82a84c, which split the sc_status field out of sc_type in the kernel's internal stateid structure. Previously, the states_show() function relied on sc_type being valid before accessing subfunctions that display stateid content. After the change, sc_type was no longer reset to zero during stateid unhashing, causing the nfs4_show_open() function to dereference a NULL pointer (sc_file) when processing closed open stateids. This results in a kernel oops (panic) when reading the NFS server's client state information, specifically when accessing /proc/fs/nfsd/clients/2/states on the server. The vulnerability can be triggered by mounting the server with NFSv4.0, reading and closing a file, and then querying the state information, which leads to a kernel crash. The root cause is improper handling of closed open stateids that lack a valid sc_file pointer, leading to a NULL pointer dereference. The fix involves skipping the display of information that requires a valid sc_file for closed open stateids, preventing the kernel panic. This vulnerability affects Linux kernel versions containing the specified commit and is relevant to systems running NFSv4.0 servers. There are no known exploits in the wild at this time, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based NFSv4.0 servers, this vulnerability can cause denial of service (DoS) conditions due to kernel panics triggered by local or potentially remote queries of NFS client state information. The impact primarily affects availability, as the kernel panic will crash the NFS server, disrupting file sharing services critical for enterprise operations, data centers, and cloud infrastructure. Confidentiality and integrity impacts are minimal since the vulnerability does not allow privilege escalation or unauthorized data access directly. However, the resulting service outages could impact business continuity and operational efficiency. Organizations with heavy reliance on NFS for file storage, especially in sectors like finance, manufacturing, research, and government, may experience significant disruption. The vulnerability requires specific conditions to trigger (NFSv4.0 usage, reading and closing files, and querying state info), so the attack surface is somewhat limited but still relevant for environments using this protocol version. The lack of known exploits reduces immediate risk but does not eliminate the threat of exploitation by skilled attackers or accidental triggering by system administrators.
Mitigation Recommendations
1. Apply the official Linux kernel patch that addresses CVE-2024-46682 as soon as it becomes available to prevent kernel panics caused by this vulnerability. 2. If patching is not immediately possible, consider disabling or limiting access to the /proc/fs/nfsd/clients/*/states interface to trusted administrators only, reducing the risk of accidental or malicious triggering. 3. Monitor kernel logs and system stability closely for signs of unexpected panics related to nfsd, especially after NFSv4.0 file operations. 4. Review and restrict NFSv4.0 usage where feasible, potentially migrating to NFSv4.1 or later versions that may not be affected. 5. Implement robust system monitoring and alerting to detect and respond quickly to service disruptions caused by kernel panics. 6. Educate system administrators about the vulnerability and safe handling of NFS client state information to avoid inadvertent triggering. 7. Employ kernel live patching solutions if available to apply fixes without downtime in critical environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.248Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe0f92
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/29/2025, 12:11:40 AM
Last updated: 8/11/2025, 3:40:32 AM
Views: 10
Related Threats
CVE-2025-8956: Command Injection in D-Link DIR‑818L
MediumCVE-2025-7761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akcess-Net Lepszy BIP
MediumCVE-2025-55346: CWE-94 Improper Control of Generation of Code ('Code Injection')
CriticalCVE-2025-8943
CriticalCVE-2025-8047: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in disable-right-click-powered-by-pixterme
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.