CVE-2024-46697: nfsd: ensure that nfsd4_fattr_args.context is zeroed out

Description

In the Linux kernel, the following vulnerability has been resolved:

nfsd: ensure that nfsd4_fattr_args.context is zeroed out

If nfsd4_encode_fattr4 ends up doing a "goto out" before we get to
checking for the security label, then args.context will be set to
uninitialized junk on the stack, which we'll then try to free.
Initialize it early.

Classification

CVE ID: CVE-2024-46697

Affected Products

Vendor: Linux

Product: Linux

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 10.08% (scored less or equal to compared to others)

EPSS Date: 2025-05-05 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-46697
https://git.kernel.org/stable/c/dd65b324174a64558a16ebbf4c3266e5701185d0
https://git.kernel.org/stable/c/f58bab6fd4063913bd8321e99874b8239e9ba726

Timeline