CVE-2024-49965

In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series "Misc fixes for ocfs2_read_blocks", v5. This series contains 2 fixes for ocfs2_read_blocks(). The first patch fix the issue reported by syzbot, which detects bad unlock balance in ocfs2_read_blocks(). The second patch fixes an issue reported by Heming Zhao when reviewing above fix. This patch (of 2): There was a lock release before exiting, so remove the unreasonable unlock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/9753bcb17b36c9add9b32c61766ddf8d2d161911 -
  • () https://git.kernel.org/stable/c/5245f109b4afb6595360d4c180d483a6d2009a59 -

07 Nov 2024, 19:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d - () https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d - Patch
References () https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc - () https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc - Patch
References () https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3 - () https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3 - Patch
References () https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d - () https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d - Patch
References () https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1 - () https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1 - Patch
References () https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af - () https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af - Patch
References () https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9 - () https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9 - Patch
CWE CWE-667

21 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 18:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-49965

Mitre link : CVE-2024-49965


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking