CVE-2024-35821

Source
https://cve.org/CVERecord?id=CVE-2024-35821
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35821.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35821
Downstream
Related
Published
2024-05-17T13:23:24.350Z
Modified
2026-03-13T07:55:23.588367Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
ubifs: Set page uptodate in the correct place
Details

In the Linux kernel, the following vulnerability has been resolved:

ubifs: Set page uptodate in the correct place

Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifswriteend(), which is after we copied the new data into the page.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35821.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d
Fixed
4aa554832b9dc9e66249df75b8f447d87853e12e
Fixed
778c6ad40256f1c03244fc06d7cdf71f6b5e7310
Fixed
8f599ab6fabbca4c741107eade70722a98adfd9f
Fixed
f19b1023a3758f40791ec166038d6411c8894ae3
Fixed
142d87c958d9454c3cffa625fab56f3016e8f9f3
Fixed
fc99f4e2d2f1ce766c14e98463c2839194ae964f
Fixed
4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e
Fixed
17772bbe9cfa972ea1ff827319f6e1340de76566
Fixed
723012cab779eee8228376754e22c6594229bf8f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35821.json"