Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-58001
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2025 | 02:11
Updated At-05 Jan, 2026 | 10:56
Rejected At-
▼CVE Numbering Authority (CNA)
ocfs2: handle a symlink read error correctly

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review ;-) So I've redone it as individual patches, and credited Mark for the patches where his code is substantially the same. It's not a bad way to do it; his patch had some bugs and my patches had some bugs. Hopefully all our bugs were different from each other. And hopefully Mark likes all the changes I made to his code! This patch (of 23): If we can't read the buffer, be sure to unlock the page before returning.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ocfs2/symlink.c
Default Status
unaffected
Versions
Affected
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before cd3e22b206189cbb4a94229002141e1529f83746 (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before afa8003f8db62e46c4b171cbf4cec2824148b4f7 (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before 8aee4184c5b79e486598c15aa80687c77f6f6e6e (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before 6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377 (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before b6833b38984d1e9f20dd80f9ec9050c10d687f30 (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before 52a326f93ceb9348264fddf7bab6e345db69e08c (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before 5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f (git)
  • From ea022dfb3c2a4680483b00eb2fecc9fc4f6091d1 before 2b4c2094da6d84e69b843dd3317902e977bf64bd (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/ocfs2/symlink.c
Default Status
affected
Versions
Affected
  • 3.5
Unaffected
  • From 0 before 3.5 (semver)
  • From 5.4.291 through 5.4.* (semver)
  • From 5.10.235 through 5.10.* (semver)
  • From 5.15.179 through 5.15.* (semver)
  • From 6.1.129 through 6.1.* (semver)
  • From 6.6.78 through 6.6.* (semver)
  • From 6.12.14 through 6.12.* (semver)
  • From 6.13.3 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746
N/A
https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7
N/A
https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e
N/A
https://git.kernel.org/stable/c/6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377
N/A
https://git.kernel.org/stable/c/b6833b38984d1e9f20dd80f9ec9050c10d687f30
N/A
https://git.kernel.org/stable/c/52a326f93ceb9348264fddf7bab6e345db69e08c
N/A
https://git.kernel.org/stable/c/5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f
N/A
https://git.kernel.org/stable/c/2b4c2094da6d84e69b843dd3317902e977bf64bd
N/A
Hyperlink: https://git.kernel.org/stable/c/cd3e22b206189cbb4a94229002141e1529f83746
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/afa8003f8db62e46c4b171cbf4cec2824148b4f7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8aee4184c5b79e486598c15aa80687c77f6f6e6e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6e143eb4ab83c24e7ad3e3d8e7daa241d9c38377
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b6833b38984d1e9f20dd80f9ec9050c10d687f30
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/52a326f93ceb9348264fddf7bab6e345db69e08c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5e3b3ec7c3cb5ba5629a766e4f0926db72cf0a1f
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2b4c2094da6d84e69b843dd3317902e977bf64bd
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
Resource: N/A
Details not found