๐Ÿ” CVE Alert

CVE-2024-58001

UNKNOWN 0.0

ocfs2: handle a symlink read error correctly

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review ;-) So I've redone it as individual patches, and credited Mark for the patches where his code is substantially the same. It's not a bad way to do it; his patch had some bugs and my patches had some bugs. Hopefully all our bugs were different from each other. And hopefully Mark likes all the changes I made to his code! This patch (of 23): If we can't read the buffer, be sure to unlock the page before returning.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < cd3e22b206189cbb4a94229002141e1529f83746 ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < afa8003f8db62e46c4b171cbf4cec2824148b4f7 ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < 8aee4184c5b79e486598c15aa80687c77f6f6e6e ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < 6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377 ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < b6833b38984d1e9f20dd80f9ec9050c10d687f30 ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < 52a326f93ceb9348264fddf7bab6e345db69e08c ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < 5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 < 2b4c2094da6d84e69b843dd3317902e977bf64bd
Linux / Linux
3.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746 git.kernel.org: https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7 git.kernel.org: https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e git.kernel.org: https://git.kernel.org/stable/c/6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377 git.kernel.org: https://git.kernel.org/stable/c/b6833b38984d1e9f20dd80f9ec9050c10d687f30 git.kernel.org: https://git.kernel.org/stable/c/52a326f93ceb9348264fddf7bab6e345db69e08c git.kernel.org: https://git.kernel.org/stable/c/5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f git.kernel.org: https://git.kernel.org/stable/c/2b4c2094da6d84e69b843dd3317902e977bf64bd lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html