๐Ÿ” CVE Alert

CVE-2024-57924

UNKNOWN 0.0

fs: relax assertions on failure to encode file handles

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs: relax assertions on failure to encode file handles Encoding file handles is usually performed by a filesystem >encode_fh() method that may fail for various reasons. The legacy users of exportfs_encode_fh(), namely, nfsd and name_to_handle_at(2) syscall are ready to cope with the possibility of failure to encode a file handle. There are a few other users of exportfs_encode_{fh,fid}() that currently have a WARN_ON() assertion when ->encode_fh() fails. Relax those assertions because they are wrong. The second linked bug report states commit 16aac5ad1fa9 ("ovl: support encoding non-decodable file handles") in v6.6 as the regressing commit, but this is not accurate. The aforementioned commit only increases the chances of the assertion and allows triggering the assertion with the reproducer using overlayfs, inotify and drop_caches. Triggering this assertion was always possible with other filesystems and other reasons of ->encode_fh() failures and more particularly, it was also possible with the exact same reproducer using overlayfs that is mounted with options index=on,nfs_export=on also on kernels < v6.6. Therefore, I am not listing the aforementioned commit as a Fixes commit. Backport hint: this patch will have a trivial conflict applying to v6.6.y, and other trivial conflicts applying to stable kernels < v6.6.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
be77196b809cdce8603a5aadd5e3cfabd3cbef96 < 73697928c806fe4689939722184a86fc1c1957b4 be77196b809cdce8603a5aadd5e3cfabd3cbef96 < f47c834a9131ae64bee3c462f4e610c67b0a000f be77196b809cdce8603a5aadd5e3cfabd3cbef96 < adcde2872f8fc399b249758ae1990dcd53b694ea be77196b809cdce8603a5aadd5e3cfabd3cbef96 < 974e3fe0ac61de85015bbe5a4990cf4127b304b2
Linux / Linux
3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/73697928c806fe4689939722184a86fc1c1957b4 git.kernel.org: https://git.kernel.org/stable/c/f47c834a9131ae64bee3c462f4e610c67b0a000f git.kernel.org: https://git.kernel.org/stable/c/adcde2872f8fc399b249758ae1990dcd53b694ea git.kernel.org: https://git.kernel.org/stable/c/974e3fe0ac61de85015bbe5a4990cf4127b304b2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html