CVE-2024-50106
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's NFS server (nfsd) that allows a race condition between delegation cleanup and client operations. It can lead to kernel memory corruption and potential system crashes or privilege escalation. Systems running Linux kernels with NFS server enabled are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential privilege escalation to kernel-level code execution, or denial of service affecting all NFS clients.
Likely Case
System instability, kernel crashes, or denial of service affecting NFS file operations for specific files with active delegations.
If Mitigated
Limited impact if NFS server is not enabled or delegation feature is disabled, though kernel crashes could still affect system stability.
🎯 Exploit Status
Exploitation requires precise timing to trigger the race condition between laundromat thread and free_stateid operations. Requires NFS client access to trigger delegation operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 8dd91e8d31febf4d9cca3ae1bb4771d33ae7ee5a and 967faa26f313a62e7bebc55d5b8122eaee43b929
Vendor Advisory: https://git.kernel.org/stable/c/8dd91e8d31febf4d9cca3ae1bb4771d33ae7ee5a
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories for backported patches. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable NFS server
linuxDisable nfsd service if not required
systemctl stop nfs-server
systemctl disable nfs-server
Disable delegation feature
linuxConfigure NFS server to disable delegation support
echo 0 > /proc/fs/nfsd/delegations
🧯 If You Can't Patch
- Disable NFS server completely if not required
- Restrict NFS access to trusted clients only and monitor for abnormal NFS operations
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if nfsd is running: 'uname -r' and 'systemctl status nfs-server' or 'ps aux | grep nfsd'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commits: 'uname -r' and check distribution patch notes
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs mentioning nfsd_breaker_owns_lease
- KASAN use-after-free warnings in kernel logs
- NFS server crash logs
Network Indicators:
- Abnormal NFS FREE_STATEID operations
- Multiple delegation revocation requests
SIEM Query:
source="kernel" AND ("KASAN" OR "use-after-free" OR "nfsd_breaker_owns_lease")