U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-49965 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: remove unreasonable unlock in ocfs2_read_blocks Patch series "Misc fixes for ocfs2_read_blocks", v5. This series contains 2 fixes for ocfs2_read_blocks(). The first patch fix the issue reported by syzbot, which detects bad unlock balance in ocfs2_read_blocks(). The second patch fixes an issue reported by Heming Zhao when reviewing above fix. This patch (of 2): There was a lock release before exiting, so remove the unreasonable unlock.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/39a88623af3f1c686bf6db1e677ed865ffe6fccc Patch 
https://git.kernel.org/stable/c/3f1ca6ba5452d53c598a45d21267a2c0c221eef3 Patch 
https://git.kernel.org/stable/c/5245f109b4afb6595360d4c180d483a6d2009a59
https://git.kernel.org/stable/c/81aba693b129e82e11bb54f569504d943d018de9 Patch 
https://git.kernel.org/stable/c/84543da867c967edffd5065fa910ebf56aaae49d Patch 
https://git.kernel.org/stable/c/9753bcb17b36c9add9b32c61766ddf8d2d161911
https://git.kernel.org/stable/c/c03a82b4a0c935774afa01fd6d128b444fd930a1 Patch 
https://git.kernel.org/stable/c/df4f20fc3673cee11abf2c571987a95733cb638d Patch 
https://git.kernel.org/stable/c/f55a33fe0fb5274ef185fd61947cf142138958af Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-667 Improper Locking cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-49965
NVD Published Date:
10/21/2024
NVD Last Modified:
11/08/2024
Source:
kernel.org