CVE-2024-35821

In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the correct place Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifs_write_end(), which is after we copied the new data into the page.
References
Link Resource
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 Patch
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 Patch
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e Patch
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e Patch
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f Patch
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 Patch
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f Patch
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 Patch
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f Patch
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 Patch
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 Patch
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e Patch
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e Patch
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f Patch
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 Patch
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f Patch
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 Patch
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-05-17 14:15

Updated : 2025-12-23 18:29


NVD link : CVE-2024-35821

Mitre link : CVE-2024-35821

CVE.ORG link : CVE-2024-35821


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
NVD-CWE-noinfo CWE-772

Missing Release of Resource after Effective Lifetime