Executive Summary

Informations
Name CVE-2024-43826 First vendor Publication 2024-08-17
Vendor Cve Last vendor Modification 2024-09-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

nfs: pass explicit offset/count to trace events

nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled.

Follow the model of the XFS trace points and pass in an expl?cit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43826

Sources (Detail)

https://git.kernel.org/stable/c/387e6e9d110250946df4d4ebef9c2def5c7a4722
https://git.kernel.org/stable/c/fada32ed6dbc748f447c8d050a961b75d946055a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-09-13 00:27:43
  • Multiple Updates
2024-08-19 17:27:25
  • Multiple Updates
2024-08-17 17:27:28
  • First insertion