CVE-2024-35821

In the Linux kernel, the following vulnerability has been resolved: ubifs: Set page uptodate in the correct place Page cache reads are lockless, so setting the freshly allocated page uptodate before we've overwritten it with the data it's supposed to have in it will allow a simultaneous reader to see old data. Move the call to SetPageUptodate into ubifs_write_end(), which is after we copied the new data into the page.
References
Link Resource
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 Patch
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 Patch
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e Patch
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e Patch
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f Patch
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 Patch
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f Patch
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 Patch
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f Patch
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 Patch
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 Patch
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e Patch
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e Patch
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f Patch
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 Patch
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f Patch
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 Patch
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 18:29

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 - () https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 - Patch
References () https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 - () https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 - Patch
References () https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e - () https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e - Patch
References () https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e - () https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e - Patch
References () https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f - () https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f - Patch
References () https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 - () https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 - Patch
References () https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f - () https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f - Patch
References () https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 - () https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 - Patch
References () https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f - () https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:20

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 - () https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3 -
References () https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 - () https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566 -
References () https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e - () https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e -
References () https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e - () https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e -
References () https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f - () https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f -
References () https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 - () https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310 -
References () https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f - () https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f -
References () https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 - () https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3 -
References () https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f - () https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

03 Jul 2024, 02:02

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-772

27 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: establece la actualización de la página en el lugar correcto. Las lecturas de la caché de la página no tienen bloqueo, por lo que configurar la actualización de la página recién asignada antes de que la sobrescribamos con los datos que se supone que debe contener lo hará. permitir que un lector simultáneo vea datos antiguos. Mueva la llamada a SetPageUptodate a ubifs_write_end(), que es después de que copiamos los nuevos datos en la página.
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-12-23 18:29


NVD link : CVE-2024-35821

Mitre link : CVE-2024-35821

CVE.ORG link : CVE-2024-35821


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
NVD-CWE-noinfo CWE-772

Missing Release of Resource after Effective Lifetime