Executive Summary

Informations
Name CVE-2024-42256 First vendor Publication 2024-08-08
Vendor Cve Last vendor Modification 2024-09-06

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 9.8
Base Score 9.8 Environmental Score 9.8
impact SubScore 5.9 Temporal Score 9.8
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix server re-repick on subrequest retry

When a subrequest is marked for needing retry, netfs will call cifs_prepare_write() which will make cifs repick the server for the op before renegotiating credits; it then calls cifs_issue_write() which invokes smb2_async_writev() - which re-repicks the server.

If a different server is then selected, this causes the increment of server->in_flight to happen against one record and the decrement to happen against another, leading to misaccounting.

Fix this by just removing the repick code in smb2_async_writev(). As this is only called from netfslib-driven code, cifs_prepare_write() should always have been called first, and so server should never be NULL and the preparatory step is repeated in the event that we do a retry.

The problem manifests as a warning looking something like:

WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]
...
RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]
...
smb2_writev_callback+0x334/0x560 [cifs]
cifs_demultiplex_thread+0x77a/0x11b0 [cifs]
kthread+0x187/0x1d0
ret_from_fork+0x34/0x60
ret_from_fork_asm+0x1a/0x30

Which may be triggered by a number of different xfstests running against an Azure server in multichannel mode. generic/249 seems the most repeatable, but generic/215, generic/249 and generic/308 may also show it.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42256

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3678

Sources (Detail)

https://git.kernel.org/stable/c/b1d0a566769b6fb3795b5289fc1daf9e0638d97a
https://git.kernel.org/stable/c/de40579b903883274fe203865f29d66b168b7236
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Date Informations
2025-06-26 02:33:35
  • Multiple Updates
2025-06-25 12:32:34
  • Multiple Updates
2025-06-24 02:38:16
  • Multiple Updates
2025-05-27 02:42:39
  • Multiple Updates
2025-03-29 03:39:05
  • Multiple Updates
2025-03-28 13:43:56
  • Multiple Updates
2025-03-28 03:17:29
  • Multiple Updates
2025-03-19 03:12:52
  • Multiple Updates
2025-03-18 03:25:47
  • Multiple Updates
2025-03-14 03:13:06
  • Multiple Updates
2025-03-06 14:09:37
  • Multiple Updates
2025-02-22 03:23:08
  • Multiple Updates
2025-01-08 03:04:15
  • Multiple Updates
2025-01-07 03:03:48
  • Multiple Updates
2024-12-25 03:02:26
  • Multiple Updates
2024-12-12 03:05:22
  • Multiple Updates
2024-11-23 03:02:26
  • Multiple Updates
2024-11-22 03:00:37
  • Multiple Updates
2024-11-20 02:58:58
  • Multiple Updates
2024-11-14 02:59:16
  • Multiple Updates
2024-11-09 02:59:17
  • Multiple Updates
2024-10-26 02:56:41
  • Multiple Updates
2024-10-25 02:58:35
  • Multiple Updates
2024-10-23 02:57:48
  • Multiple Updates
2024-10-03 02:53:06
  • Multiple Updates
2024-10-02 02:51:30
  • Multiple Updates
2024-09-14 21:30:05
  • Multiple Updates
2024-09-11 21:27:55
  • Multiple Updates
2024-09-06 21:28:15
  • Multiple Updates
2024-09-06 17:27:36
  • Multiple Updates
2024-08-08 17:27:24
  • Multiple Updates
2024-08-08 13:27:30
  • First insertion