Executive Summary

Informations
Name CVE-2024-35821 First vendor Publication 2024-05-17
Vendor Cve Last vendor Modification 2024-05-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

ubifs: Set page uptodate in the correct place

Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifs_write_end(), which is after we copied the new data into the page.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821

Sources (Detail)

https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-05-18 00:27:24
  • Multiple Updates
2024-05-17 21:27:24
  • First insertion