CVE-2024-43826

In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an explіcit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Sep 2025, 15:28

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722 - () https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722 - Patch
References () https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a - () https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a - Patch

12 Sep 2024, 18:15

Type Values Removed Values Added
Summary (en) In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an expl?cit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges. (en) In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an explіcit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs: pasar compensación/recuento explícito para rastrear eventos nfs_folio_length no es seguro de usar sin tener el folio bloqueado y una verificación de NULL ->f_mapping que protege contra truncamientos y puede llevar al kernel accidentes. Por ejemplo, cuando se ejecuta xfstests generic/065 con todos los puntos de seguimiento nfs habilitados. Siga el modelo de los puntos de seguimiento XFS y pase un desplazamiento y una longitud explícitos. Esto tiene el beneficio adicional de que estos valores pueden ser más precisos ya que algunos de los usuarios tocan rangos de folios parciales.
Summary (en) In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an explіcit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges. (en) In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an expl?cit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2025-09-29 15:28


NVD link : CVE-2024-43826

Mitre link : CVE-2024-43826

CVE.ORG link : CVE-2024-43826


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference