Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-43826 | First vendor Publication | 2024-08-17 |
Vendor | Cve | Last vendor Modification | 2024-09-12 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: nfs: pass explicit offset/count to trace events nfs_folio_length is unsafe to use without having the folio locked and a check for a NULL ->f_mapping that protects against truncations and can lead to kernel crashes. E.g. when running xfstests generic/065 with all nfs trace points enabled. Follow the model of the XFS trace points and pass in an expl?cit offset and length. This has the additional benefit that these values can be more accurate as some of the users touch partial folio ranges. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43826 |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-09-13 00:27:43 |
|
2024-08-19 17:27:25 |
|
2024-08-17 17:27:28 |
|