CVE-2024-43826
nfs: pass explicit offset/count to trace events
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an explіcit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Aug 17, 2024 |
| Last Updated | Mar 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Linux / Linux
eb5654b3b89d5e836312cea9f3fdb49457852e89 < 1562138b9cababf637eee485e98491f9206a990d eb5654b3b89d5e836312cea9f3fdb49457852e89 < 387e6e9d110250946df4d4ebef9c2def5c7a4722 eb5654b3b89d5e836312cea9f3fdb49457852e89 < fada32ed6dbc748f447c8d050a961b75d946055a
Linux / Linux
6.3