CVE-2024-49965

Source
https://cve.org/CVERecord?id=CVE-2024-49965
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49965.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-49965
Downstream
Related
Published
2024-10-21T18:02:16.407Z
Modified
2026-05-15T11:54:10.186358258Z
Summary
ocfs2: remove unreasonable unlock in ocfs2_read_blocks
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove unreasonable unlock in ocfs2readblocks

Patch series "Misc fixes for ocfs2readblocks", v5.

This series contains 2 fixes for ocfs2readblocks(). The first patch fix the issue reported by syzbot, which detects bad unlock balance in ocfs2readblocks(). The second patch fixes an issue reported by Heming Zhao when reviewing above fix.

This patch (of 2):

There was a lock release before exiting, so remove the unreasonable unlock.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/49xxx/CVE-2024-49965.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.323
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.285
Fixed
5.10.227
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.15.168
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
6.1.113
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.6.55
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.10.14
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-49965.json"