{"id":"CVE-2024-53173","summary":"NFSv4.0: Fix a use-after-free problem in the asynchronous open()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4.0: Fix a use-after-free problem in the asynchronous open()\n\nYang Erkun reports that when two threads are opening files at the same\ntime, and are forced to abort before a reply is seen, then the call to\nnfs_release_seqid() in nfs4_opendata_free() can result in a\nuse-after-free of the pointer to the defunct rpc task of the other\nthread.\nThe fix is to ensure that if the RPC call is aborted before the call to\nnfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()\nin nfs4_open_release() before the rpc_task is freed.","modified":"2026-04-02T12:22:55.577745Z","published":"2024-12-27T13:49:17.981Z","related":["SUSE-SU-2025:0117-1","SUSE-SU-2025:0152-1","SUSE-SU-2025:0153-1","SUSE-SU-2025:0154-1","SUSE-SU-2025:0201-1","SUSE-SU-2025:0201-2","SUSE-SU-2025:0202-1","SUSE-SU-2025:0203-1","SUSE-SU-2025:0229-1","SUSE-SU-2025:0230-1","SUSE-SU-2025:0231-1","SUSE-SU-2025:0236-1","SUSE-SU-2025:02387-1","SUSE-SU-2025:02388-1","SUSE-SU-2025:02389-1","SUSE-SU-2025:02390-1","SUSE-SU-2025:02391-1","SUSE-SU-2025:02392-1","SUSE-SU-2025:02396-1","SUSE-SU-2025:02398-1","SUSE-SU-2025:02400-1","SUSE-SU-2025:02401-1","SUSE-SU-2025:02403-1","SUSE-SU-2025:02410-1","SUSE-SU-2025:02411-1","SUSE-SU-2025:02412-1","SUSE-SU-2025:02415-1","SUSE-SU-2025:02416-1","SUSE-SU-2025:02419-1","SUSE-SU-2025:02420-1","SUSE-SU-2025:02422-1","SUSE-SU-2025:02428-1","SUSE-SU-2025:02433-1","SUSE-SU-2025:02434-1","SUSE-SU-2025:02436-1","SUSE-SU-2025:02440-1","SUSE-SU-2025:02446-1","SUSE-SU-2025:02449-1","SUSE-SU-2025:02454-1","SUSE-SU-2025:02455-1","SUSE-SU-2025:02459-1","SUSE-SU-2025:02507-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:0603-1","SUSE-SU-2025:0784-1","SUSE-SU-2025:0833-1","SUSE-SU-2025:0833-2","SUSE-SU-2025:0834-1","SUSE-SU-2025:0835-1","SUSE-SU-2025:0847-1","SUSE-SU-2025:0853-1","SUSE-SU-2025:0855-1","SUSE-SU-2025:0856-1","SUSE-SU-2025:0867-1","SUSE-SU-2025:0945-1","SUSE-SU-2025:0955-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20517-1","SUSE-SU-2025:20518-1","SUSE-SU-2025:20519-1","SUSE-SU-2025:20525-1","SUSE-SU-2025:20526-1","SUSE-SU-2025:20527-1","SUSE-SU-2025:20540-1","SUSE-SU-2025:20541-1","SUSE-SU-2025:20544-1","SUSE-SU-2025:20545-1","SUSE-SU-2025:4123-1","USN-7276-1","USN-7277-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53173.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1cfae9575296f5040cdc84b0730e79078c081d2d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/229a30ed42bb87bcb044c5523fabd9e4f0e75648"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2ab9639f16b05d948066a6c4cf19a0fdc61046ff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2fdb05dc0931250574f0cb0ebeb5ed8e20f4a889"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5237a297ffd374a1c4157a53543b7a69d7bbbc03"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7bf6bf130af8ee7d93a99c28a7512df3017ec759"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b56ae8e715557b4fc227c9381d2e681ffafe7b15"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba6e6c04f60fe52d91520ac4d749d372d4c74521"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e2277a1d9d5cd0d625a4fd7c04fce2b53e66df77"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53173.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53173"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"24ac23ab88df5b21b5b2df8cde748bf99b289099"},{"fixed":"1cfae9575296f5040cdc84b0730e79078c081d2d"},{"fixed":"7bf6bf130af8ee7d93a99c28a7512df3017ec759"},{"fixed":"5237a297ffd374a1c4157a53543b7a69d7bbbc03"},{"fixed":"2ab9639f16b05d948066a6c4cf19a0fdc61046ff"},{"fixed":"ba6e6c04f60fe52d91520ac4d749d372d4c74521"},{"fixed":"229a30ed42bb87bcb044c5523fabd9e4f0e75648"},{"fixed":"e2277a1d9d5cd0d625a4fd7c04fce2b53e66df77"},{"fixed":"b56ae8e715557b4fc227c9381d2e681ffafe7b15"},{"fixed":"2fdb05dc0931250574f0cb0ebeb5ed8e20f4a889"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53173.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}