๐Ÿ” CVE Alert

CVE-2024-49965

UNKNOWN 0.0

ocfs2: remove unreasonable unlock in ocfs2_read_blocks

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series "Misc fixes for ocfs2_read_blocks", v5. This series contains 2 fixes for ocfs2_read_blocks(). The first patch fix the issue reported by syzbot, which detects bad unlock balance in ocfs2_read_blocks(). The second patch fixes an issue reported by Heming Zhao when reviewing above fix. This patch (of 2): There was a lock release before exiting, so remove the unreasonable unlock.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6c150df9c2e80b5cf86f5a0d98beb7390ad63bfc < 5245f109b4afb6595360d4c180d483a6d2009a59 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 9753bcb17b36c9add9b32c61766ddf8d2d161911 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 3f1ca6ba5452d53c598a45d21267a2c0c221eef3 cf76c78595ca87548ca5e45c862ac9e0949c4687 < f55a33fe0fb5274ef185fd61947cf142138958af cf76c78595ca87548ca5e45c862ac9e0949c4687 < 81aba693b129e82e11bb54f569504d943d018de9 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 84543da867c967edffd5065fa910ebf56aaae49d cf76c78595ca87548ca5e45c862ac9e0949c4687 < df4f20fc3673cee11abf2c571987a95733cb638d cf76c78595ca87548ca5e45c862ac9e0949c4687 < 39a88623af3f1c686bf6db1e677ed865ffe6fccc cf76c78595ca87548ca5e45c862ac9e0949c4687 < c03a82b4a0c935774afa01fd6d128b444fd930a1 01f93d5e36753fc4d06ec67f05ce78c9c6f2dd56 65cbd1279f4b999d56a838344a30642db24cd215 97e1db17bc1ef4c2e1789bc9323c7be44fba53f8
Linux / Linux
4.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5245f109b4afb6595360d4c180d483a6d2009a59 git.kernel.org: https://git.kernel.org/stable/c/9753bcb17b36c9add9b32c61766ddf8d2d161911 git.kernel.org: https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3 git.kernel.org: https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af git.kernel.org: https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9 git.kernel.org: https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d git.kernel.org: https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d git.kernel.org: https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc git.kernel.org: https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html