vulnerability
Red Hat: CVE-2024-43826: kernel: nfs: pass explicit offset/count to trace events (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:L/Au:M/C:N/I:N/A:C) | 2024-08-17 | 2024-12-05 | 2025-03-10 |
Severity
4
CVSS
(AV:L/AC:L/Au:M/C:N/I:N/A:C)
Published
2024-08-17
Added
2024-12-05
Modified
2025-03-10
Description
In the Linux kernel, the following vulnerability has been resolved:
nfs: pass explicit offset/count to trace events
nfs_folio_length is unsafe to use without having the folio locked and a
check for a NULL ->f_mapping that protects against truncations and can
lead to kernel crashes. E.g. when running xfstests generic/065 with
all nfs trace points enabled.
Follow the model of the XFS trace points and pass in an expl?cit offset
and length. This has the additional benefit that these values can
be more accurate as some of the users touch partial folio ranges.
Solution(s)
redhat-upgrade-kernelredhat-upgrade-kernel-rt
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.