7.5

CVE-2024-35821

In the Linux kernel, the following vulnerability has been resolved:

ubifs: Set page uptodate in the correct place

Page cache reads are lockless, so setting the freshly allocated page
uptodate before we've overwritten it with the data it's supposed to have
in it will allow a simultaneous reader to see old data.  Move the call
to SetPageUptodate into ubifs_write_end(), which is after we copied the
new data into the page.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 4aa554832b9d
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 778c6ad40256
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 8f599ab6fabb
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < f19b1023a375
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 142d87c958d9
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < fc99f4e2d2f1
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 4b7c4fc60d6a
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 17772bbe9cfa
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 723012cab779
Version 1e51764a3c2a
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version 2.6.27
Status affected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version < 2.6.27
Version 0
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 4.19.*
Version 4.19.312
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 5.4.*
Version 5.4.274
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 5.10.*
Version 5.10.215
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 5.15.*
Version 5.15.154
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 6.1.*
Version 6.1.84
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 6.6.*
Version 6.6.24
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 6.7.*
Version 6.7.12
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version <= 6.8.*
Version 6.8.3
Status unaffected
Vendorlinux
Product linux_kernel
Default Statusunknown
Version 6.9
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.32% 0.548
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE-772 Missing Release of Resource after Effective Lifetime

The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.