๐Ÿ” CVE Alert

CVE-2024-57952

MEDIUM 5.5

Revert "libfs: fix infinite directory reads for offset dir"

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: Revert "libfs: fix infinite directory reads for offset dir" The current directory offset allocator (based on mtree_alloc_cyclic) stores the next offset value to return in octx->next_offset. This mechanism typically returns values that increase monotonically over time. Eventually, though, the newly allocated offset value wraps back to a low number (say, 2) which is smaller than other already- allocated offset values. Yu Kuai <[email protected]> reports that, after commit 64a7ce76fb90 ("libfs: fix infinite directory reads for offset dir"), if a directory's offset allocator wraps, existing entries are no longer visible via readdir/getdents because offset_readdir() stops listing entries once an entry's offset is larger than octx->next_offset. These entries vanish persistently -- they can be looked up, but will never again appear in readdir(3) output. The reason for this is that the commit treats directory offsets as monotonically increasing integer values rather than opaque cookies, and introduces this comparison: if (dentry2offset(dentry) >= last_index) { On 64-bit platforms, the directory offset value upper bound is 2^63 - 1. Directory offsets will monotonically increase for millions of years without wrapping. On 32-bit platforms, however, LONG_MAX is 2^31 - 1. The allocator can wrap after only a few weeks (at worst). Revert commit 64a7ce76fb90 ("libfs: fix infinite directory reads for offset dir") to prepare for a fix that can work properly on 32-bit systems and might apply to recent LTS kernels where shmem employs the simple_offset mechanism.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 12, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a < 9e9e710f68bac49bd9b587823c077d06363440e0 64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a < 3f250b82040a72b0059ae00855a74d8570ad2147 64a7ce76fb901bf9f9c36cf5d681328fc0fd4b5a < b662d858131da9a8a14e68661656989b14dbf113 308b4fc2403b335894592ee9dc212a5e58bb309f
Linux / Linux
6.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9e9e710f68bac49bd9b587823c077d06363440e0 git.kernel.org: https://git.kernel.org/stable/c/3f250b82040a72b0059ae00855a74d8570ad2147 git.kernel.org: https://git.kernel.org/stable/c/b662d858131da9a8a14e68661656989b14dbf113