CVE-2024-49965
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series "Misc fixes for ocfs2_read_blocks", v5. This series contains 2 fixes for ocfs2_read_blocks(). The first patch fix the issue reported by syzbot, which detects bad unlock balance in ocfs2_read_blocks(). The second patch fixes an issue reported by Heming Zhao when reviewing above fix. This patch (of 2): There was a lock release before exiting, so remove the unreasonable unlock.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 21, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
6c150df9c2e80b5cf86f5a0d98beb7390ad63bfc < 5245f109b4afb6595360d4c180d483a6d2009a59 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 9753bcb17b36c9add9b32c61766ddf8d2d161911 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 3f1ca6ba5452d53c598a45d21267a2c0c221eef3 cf76c78595ca87548ca5e45c862ac9e0949c4687 < f55a33fe0fb5274ef185fd61947cf142138958af cf76c78595ca87548ca5e45c862ac9e0949c4687 < 81aba693b129e82e11bb54f569504d943d018de9 cf76c78595ca87548ca5e45c862ac9e0949c4687 < 84543da867c967edffd5065fa910ebf56aaae49d cf76c78595ca87548ca5e45c862ac9e0949c4687 < df4f20fc3673cee11abf2c571987a95733cb638d cf76c78595ca87548ca5e45c862ac9e0949c4687 < 39a88623af3f1c686bf6db1e677ed865ffe6fccc cf76c78595ca87548ca5e45c862ac9e0949c4687 < c03a82b4a0c935774afa01fd6d128b444fd930a1 01f93d5e36753fc4d06ec67f05ce78c9c6f2dd56 65cbd1279f4b999d56a838344a30642db24cd215 97e1db17bc1ef4c2e1789bc9323c7be44fba53f8
Linux / Linux
4.20
References
git.kernel.org: https://git.kernel.org/stable/c/5245f109b4afb6595360d4c180d483a6d2009a59 git.kernel.org: https://git.kernel.org/stable/c/9753bcb17b36c9add9b32c61766ddf8d2d161911 git.kernel.org: https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3 git.kernel.org: https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af git.kernel.org: https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9 git.kernel.org: https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d git.kernel.org: https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d git.kernel.org: https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc git.kernel.org: https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html