{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-57940","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-01-19T11:50:08.378Z","datePublished":"2025-01-21T12:18:09.150Z","dateUpdated":"2025-11-03T20:56:09.764Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T10:07:07.089Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nexfat: fix the infinite loop in exfat_readdir()\n\nIf the file system is corrupted so that a cluster is linked to\nitself in the cluster chain, and there is an unused directory\nentry in the cluster, 'dentry' will not be incremented, causing\ncondition 'dentry < max_dentries' unable to prevent an infinite\nloop.\n\nThis infinite loop causes s_lock not to be released, and other\ntasks will hang, such as exfat_sync_fs().\n\nThis commit stops traversing the cluster chain when there is unused\ndirectory entry in the cluster to avoid this infinite loop."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/exfat/dir.c"],"versions":[{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"d8cfbb8723bd3d3222f360227a1cc15227189ca6","status":"affected","versionType":"git"},{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"28c21f0ac5293a4bf19b3e0e32005d6dd31a6c17","status":"affected","versionType":"git"},{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"31beabd0f47f8c3ed9965ba861c9e5b252d4920a","status":"affected","versionType":"git"},{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"dc1d7afceb982e8f666e70a582e6b5aa806de063","status":"affected","versionType":"git"},{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"d9ea94f5cd117d56e573696d0045ab3044185a15","status":"affected","versionType":"git"},{"version":"ca06197382bde0a3bc20215595d1c9ce20c6e341","lessThan":"fee873761bd978d077d8c55334b4966ac4cb7b59","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/exfat/dir.c"],"versions":[{"version":"5.7","status":"affected"},{"version":"0","lessThan":"5.7","status":"unaffected","versionType":"semver"},{"version":"5.10.234","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.177","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.125","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.72","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.10","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.10.234"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.15.177"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.1.125"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.6.72"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.12.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d8cfbb8723bd3d3222f360227a1cc15227189ca6"},{"url":"https://git.kernel.org/stable/c/28c21f0ac5293a4bf19b3e0e32005d6dd31a6c17"},{"url":"https://git.kernel.org/stable/c/31beabd0f47f8c3ed9965ba861c9e5b252d4920a"},{"url":"https://git.kernel.org/stable/c/dc1d7afceb982e8f666e70a582e6b5aa806de063"},{"url":"https://git.kernel.org/stable/c/d9ea94f5cd117d56e573696d0045ab3044185a15"},{"url":"https://git.kernel.org/stable/c/fee873761bd978d077d8c55334b4966ac4cb7b59"}],"title":"exfat: fix the infinite loop in exfat_readdir()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:56:09.764Z"}}]}}