CVE-2024-58001

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review ;-) So I've redone it as individual patches, and credited Mark for the patches where his code is substantially the same. It's not a bad way to do it; his patch had some bugs and my patches had some bugs. Hopefully all our bugs were different from each other. And hopefully Mark likes all the changes I made to his code! This patch (of 23): If we can't read the buffer, be sure to unlock the page before returning.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2025, 13:05

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/2b4c2094da6d84e69b843dd3317902e977bf64bd - () https://git.kernel.org/stable/c/2b4c2094da6d84e69b843dd3317902e977bf64bd - Patch
References () https://git.kernel.org/stable/c/52a326f93ceb9348264fddf7bab6e345db69e08c - () https://git.kernel.org/stable/c/52a326f93ceb9348264fddf7bab6e345db69e08c - Patch
References () https://git.kernel.org/stable/c/5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f - () https://git.kernel.org/stable/c/5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f - Patch
References () https://git.kernel.org/stable/c/6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377 - () https://git.kernel.org/stable/c/6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377 - Patch
References () https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e - () https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e - Patch
References () https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7 - () https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7 - Patch
References () https://git.kernel.org/stable/c/b6833b38984d1e9f20dd80f9ec9050c10d687f30 - () https://git.kernel.org/stable/c/b6833b38984d1e9f20dd80f9ec9050c10d687f30 - Patch
References () https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746 - () https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e -
  • () https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7 -
  • () https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ocfs2: gestiona correctamente un error de lectura de enlace simbólico Serie de parches "Convertir ocfs2 para usar folios". Mark hizo una conversión de ocfs2 para usar folios y me lo envió como un parche gigante para revisión ;-) Así que lo rehice como parches individuales y le di crédito a Mark por los parches donde su código es sustancialmente el mismo. No es una mala forma de hacerlo; su parche tenía algunos errores y mis parches tenían algunos errores. Con suerte, todos nuestros errores fueron diferentes entre sí. ¡Y con suerte a Mark le gustan todos los cambios que hice en su código! Este parche (de 23): Si no podemos leer el búfer, asegúrese de desbloquear la página antes de regresar.

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-23 13:05


NVD link : CVE-2024-58001

Mitre link : CVE-2024-58001

CVE.ORG link : CVE-2024-58001


JSON object : View

Products Affected

linux

  • linux_kernel