In the Linux kernel, the following vulnerability has been resolved:
nfs: pass explicit offset/count to trace events
nfs_folio_length is unsafe to use without having the folio locked and a
check for a NULL ->f_mapping that protects against truncations and can
lead to kernel crashes. E.g. when running xfstests generic/065 with
all nfs trace points enabled.
Follow the model of the XFS trace points and pass in an explіcit offset
and length. This has the additional benefit that these values can
be more accurate as some of the users touch partial folio ranges.
References
Configurations
History
29 Sep 2025, 15:28
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722 - Patch | |
| References | () https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a - Patch |
Information
Published : 2024-08-17 10:15
Updated : 2025-09-29 15:28
NVD link : CVE-2024-43826
Mitre link : CVE-2024-43826
CVE.ORG link : CVE-2024-43826
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
