CVE-2024-58001

Source
https://cve.org/CVERecord?id=CVE-2024-58001
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58001.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58001
Downstream
Related
Published
2025-02-27T02:11:59.570Z
Modified
2026-03-20T12:41:05.795289Z
Summary
ocfs2: handle a symlink read error correctly
Details

In the Linux kernel, the following vulnerability has been resolved:

ocfs2: handle a symlink read error correctly

Patch series "Convert ocfs2 to use folios".

Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review ;-)

So I've redone it as individual patches, and credited Mark for the patches where his code is substantially the same. It's not a bad way to do it; his patch had some bugs and my patches had some bugs. Hopefully all our bugs were different from each other. And hopefully Mark likes all the changes I made to his code!

This patch (of 23):

If we can't read the buffer, be sure to unlock the page before returning.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/58xxx/CVE-2024-58001.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1
Fixed
cd3e22b206189cbb4a94229002141e1529f83746
Fixed
afa8003f8db62e46c4b171cbf4cec2824148b4f7
Fixed
8aee4184c5b79e486598c15aa80687c77f6f6e6e
Fixed
6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377
Fixed
b6833b38984d1e9f20dd80f9ec9050c10d687f30
Fixed
52a326f93ceb9348264fddf7bab6e345db69e08c
Fixed
5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f
Fixed
2b4c2094da6d84e69b843dd3317902e977bf64bd

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58001.json"