We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49966

ocfs2: cancel dqi_sync_work before freeing oinfo



Description

In the Linux kernel, the following vulnerability has been resolved: ocfs2: cancel dqi_sync_work before freeing oinfo ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the end, if error occurs after successfully reading global quota, it will trigger the following warning with CONFIG_DEBUG_OBJECTS_* enabled: ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c This reports that there is an active delayed work when freeing oinfo in error handling, so cancel dqi_sync_work first. BTW, return status instead of -1 when .read_file_info fails.

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before fc5cc716dfbdc5fd5f373ff3b51358174cf88bfc
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before 89043e7ed63c7fc141e68ea5a79758ed24b6c699
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before 14114d8148db07e7946fb06b56a50cfa425e26c7
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before 4173d1277c00baeedaaca76783e98b8fd0e3c08d
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before bbf41277df8b33fbedf4750a9300c147e8f104eb
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before ef768020366f47d23f39c4f57bcb03af6d1e24b3
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before a4346c04d055bf7e184c18a73dbd23b6a9811118
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before 0d707a33c84b371cb66120e198eed3374726ddd8
affected

171bf93ce11f4c9929fdce6ce63df8da2f3c4475 before 35fccce29feb3706f649726d410122dd81b92c18
affected

Default status
affected

2.6.29
affected

Any version before 2.6.29
unaffected

4.19.323
unaffected

5.4.285
unaffected

5.10.227
unaffected

5.15.168
unaffected

6.1.113
unaffected

6.6.55
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/fc5cc716dfbdc5fd5f373ff3b51358174cf88bfc

git.kernel.org/...c/89043e7ed63c7fc141e68ea5a79758ed24b6c699

git.kernel.org/...c/14114d8148db07e7946fb06b56a50cfa425e26c7

git.kernel.org/...c/4173d1277c00baeedaaca76783e98b8fd0e3c08d

git.kernel.org/...c/bbf41277df8b33fbedf4750a9300c147e8f104eb

git.kernel.org/...c/ef768020366f47d23f39c4f57bcb03af6d1e24b3

git.kernel.org/...c/a4346c04d055bf7e184c18a73dbd23b6a9811118

git.kernel.org/...c/0d707a33c84b371cb66120e198eed3374726ddd8

git.kernel.org/...c/35fccce29feb3706f649726d410122dd81b92c18

cve.org (CVE-2024-49966)

nvd.nist.gov (CVE-2024-49966)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-49966

Support options

Helpdesk Chat, Email, Knowledgebase