7.5
CVE-2024-35821
- EPSS 0.32%
- Published 17.05.2024 14:15:17
- Last modified 21.11.2024 09:20:58
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the correct place Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifs_write_end(), which is after we copied the new data into the page.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
4aa554832b9d
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
778c6ad40256
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
8f599ab6fabb
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
f19b1023a375
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
142d87c958d9
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
fc99f4e2d2f1
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
4b7c4fc60d6a
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
17772bbe9cfa
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
723012cab779
Version
1e51764a3c2a
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version
2.6.27
Status
affected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <
2.6.27
Version
0
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
4.19.*
Version
4.19.312
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
5.4.*
Version
5.4.274
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
5.10.*
Version
5.10.215
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
5.15.*
Version
5.15.154
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
6.1.*
Version
6.1.84
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
6.6.*
Version
6.6.24
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
6.7.*
Version
6.7.12
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version <=
6.8.*
Version
6.8.3
Status
unaffected
Vendorlinux
≫
Product
linux_kernel
Default Statusunknown
Version
6.9
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.32% | 0.548 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
CWE-772 Missing Release of Resource after Effective Lifetime
The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.