U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2024-35821 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the correct place Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifs_write_end(), which is after we copied the new data into the page.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source
CWE-772 Missing Release of Resource after Effective Lifetime CISA-ADP  

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-35821
NVD Published Date:
05/17/2024
NVD Last Modified:
07/02/2024
Source:
kernel.org