🔐 CVE Alert

CVE-2024-43826

UNKNOWN 0.0

nfs: pass explicit offset/count to trace events

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an explіcit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 17, 2024
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Linux / Linux
eb5654b3b89d5e836312cea9f3fdb49457852e89 < 1562138b9cababf637eee485e98491f9206a990d eb5654b3b89d5e836312cea9f3fdb49457852e89 < 387e6e9d110250946df4d4ebef9c2def5c7a4722 eb5654b3b89d5e836312cea9f3fdb49457852e89 < fada32ed6dbc748f447c8d050a961b75d946055a
Linux / Linux
6.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
git.kernel.org: https://git.kernel.org/stable/c/1562138b9cababf637eee485e98491f9206a990d git.kernel.org: https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722 git.kernel.org: https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a