๐Ÿ” CVE Alert

CVE-2025-21654

UNKNOWN 0.0

ovl: support encoding fid from inode with no alias

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ovl: support encoding fid from inode with no alias Dmitry Safonov reported that a WARN_ON() assertion can be trigered by userspace when calling inotify_show_fdinfo() for an overlayfs watched inode, whose dentry aliases were discarded with drop_caches. The WARN_ON() assertion in inotify_show_fdinfo() was removed, because it is possible for encoding file handle to fail for other reason, but the impact of failing to encode an overlayfs file handle goes beyond this assertion. As shown in the LTP test case mentioned in the link below, failure to encode an overlayfs file handle from a non-aliased inode also leads to failure to report an fid with FAN_DELETE_SELF fanotify events. As Dmitry notes in his analyzis of the problem, ovl_encode_fh() fails if it cannot find an alias for the inode, but this failure can be fixed. ovl_encode_fh() seldom uses the alias and in the case of non-decodable file handles, as is often the case with fanotify fid info, ovl_encode_fh() never needs to use the alias to encode a file handle. Defer finding an alias until it is actually needed so ovl_encode_fh() will not fail in the common case of FAN_DELETE_SELF fanotify events.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
16aac5ad1fa94894b798dd522c5c3a6a0628d7f0 < f0c0ac84de17c37e6e84da65fb920f91dada55ad 16aac5ad1fa94894b798dd522c5c3a6a0628d7f0 < 3c7c90274ae339e1ad443c9be1c67a20b80b9c76 16aac5ad1fa94894b798dd522c5c3a6a0628d7f0 < c45beebfde34aa71afbc48b2c54cdda623515037
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f0c0ac84de17c37e6e84da65fb920f91dada55ad git.kernel.org: https://git.kernel.org/stable/c/3c7c90274ae339e1ad443c9be1c67a20b80b9c76 git.kernel.org: https://git.kernel.org/stable/c/c45beebfde34aa71afbc48b2c54cdda623515037