๐Ÿ” CVE Alert

CVE-2024-49966

UNKNOWN 0.0

ocfs2: cancel dqi_sync_work before freeing oinfo

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: cancel dqi_sync_work before freeing oinfo ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the end, if error occurs after successfully reading global quota, it will trigger the following warning with CONFIG_DEBUG_OBJECTS_* enabled: ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c This reports that there is an active delayed work when freeing oinfo in error handling, so cancel dqi_sync_work first. BTW, return status instead of -1 when .read_file_info fails.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < fc5cc716dfbdc5fd5f373ff3b51358174cf88bfc 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < 89043e7ed63c7fc141e68ea5a79758ed24b6c699 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < 14114d8148db07e7946fb06b56a50cfa425e26c7 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < 4173d1277c00baeedaaca76783e98b8fd0e3c08d 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < bbf41277df8b33fbedf4750a9300c147e8f104eb 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < ef768020366f47d23f39c4f57bcb03af6d1e24b3 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < a4346c04d055bf7e184c18a73dbd23b6a9811118 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < 0d707a33c84b371cb66120e198eed3374726ddd8 171bf93ce11f4c9929fdce6ce63df8da2f3c4475 < 35fccce29feb3706f649726d410122dd81b92c18
Linux / Linux
2.6.29

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fc5cc716dfbdc5fd5f373ff3b51358174cf88bfc git.kernel.org: https://git.kernel.org/stable/c/89043e7ed63c7fc141e68ea5a79758ed24b6c699 git.kernel.org: https://git.kernel.org/stable/c/14114d8148db07e7946fb06b56a50cfa425e26c7 git.kernel.org: https://git.kernel.org/stable/c/4173d1277c00baeedaaca76783e98b8fd0e3c08d git.kernel.org: https://git.kernel.org/stable/c/bbf41277df8b33fbedf4750a9300c147e8f104eb git.kernel.org: https://git.kernel.org/stable/c/ef768020366f47d23f39c4f57bcb03af6d1e24b3 git.kernel.org: https://git.kernel.org/stable/c/a4346c04d055bf7e184c18a73dbd23b6a9811118 git.kernel.org: https://git.kernel.org/stable/c/0d707a33c84b371cb66120e198eed3374726ddd8 git.kernel.org: https://git.kernel.org/stable/c/35fccce29feb3706f649726d410122dd81b92c18 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html