Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-57924
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 Jan, 2025 | 11:52
Updated At-05 Jan, 2026 | 10:56
Rejected At-
▼CVE Numbering Authority (CNA)
fs: relax assertions on failure to encode file handles

In the Linux kernel, the following vulnerability has been resolved: fs: relax assertions on failure to encode file handles Encoding file handles is usually performed by a filesystem >encode_fh() method that may fail for various reasons. The legacy users of exportfs_encode_fh(), namely, nfsd and name_to_handle_at(2) syscall are ready to cope with the possibility of failure to encode a file handle. There are a few other users of exportfs_encode_{fh,fid}() that currently have a WARN_ON() assertion when ->encode_fh() fails. Relax those assertions because they are wrong. The second linked bug report states commit 16aac5ad1fa9 ("ovl: support encoding non-decodable file handles") in v6.6 as the regressing commit, but this is not accurate. The aforementioned commit only increases the chances of the assertion and allows triggering the assertion with the reproducer using overlayfs, inotify and drop_caches. Triggering this assertion was always possible with other filesystems and other reasons of ->encode_fh() failures and more particularly, it was also possible with the exact same reproducer using overlayfs that is mounted with options index=on,nfs_export=on also on kernels < v6.6. Therefore, I am not listing the aforementioned commit as a Fixes commit. Backport hint: this patch will have a trivial conflict applying to v6.6.y, and other trivial conflicts applying to stable kernels < v6.6.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/notify/fdinfo.c
  • fs/overlayfs/copy_up.c
Default Status
unaffected
Versions
Affected
  • From be77196b809cdce8603a5aadd5e3cfabd3cbef96 before 73697928c806fe4689939722184a86fc1c1957b4 (git)
  • From be77196b809cdce8603a5aadd5e3cfabd3cbef96 before f47c834a9131ae64bee3c462f4e610c67b0a000f (git)
  • From be77196b809cdce8603a5aadd5e3cfabd3cbef96 before adcde2872f8fc399b249758ae1990dcd53b694ea (git)
  • From be77196b809cdce8603a5aadd5e3cfabd3cbef96 before 974e3fe0ac61de85015bbe5a4990cf4127b304b2 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/notify/fdinfo.c
  • fs/overlayfs/copy_up.c
Default Status
affected
Versions
Affected
  • 3.8
Unaffected
  • From 0 before 3.8 (semver)
  • From 6.1.151 through 6.1.* (semver)
  • From 6.6.74 through 6.6.* (semver)
  • From 6.12.10 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/73697928c806fe4689939722184a86fc1c1957b4
N/A
https://git.kernel.org/stable/c/f47c834a9131ae64bee3c462f4e610c67b0a000f
N/A
https://git.kernel.org/stable/c/adcde2872f8fc399b249758ae1990dcd53b694ea
N/A
https://git.kernel.org/stable/c/974e3fe0ac61de85015bbe5a4990cf4127b304b2
N/A
Hyperlink: https://git.kernel.org/stable/c/73697928c806fe4689939722184a86fc1c1957b4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f47c834a9131ae64bee3c462f4e610c67b0a000f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/adcde2872f8fc399b249758ae1990dcd53b694ea
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/974e3fe0ac61de85015bbe5a4990cf4127b304b2
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Details not found