In the Linux kernel, the following vulnerability has been resolved:
ceph: remove the incorrect Fw reference check when dirtying pages
When doing the direct-io reads it will also try to mark pages dirty,
but for the read path it won't hold the Fw caps and there is case
will it get the Fw reference.
References
Configurations
Configuration 1 (hide)
|
History
29 Nov 2024, 20:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/11ab19d48ab877430eed0c7d83810970bbcbc4f6 - Patch | |
References | () https://git.kernel.org/stable/c/126b567a2ef65fc38a71d832bf1216c56816f231 - Patch | |
References | () https://git.kernel.org/stable/c/74b302ebad5b43ac17460fa58092d892a3cba6eb - Patch | |
References | () https://git.kernel.org/stable/c/9d4f619153bab7fa59736462967821d6521a38cb - Patch | |
References | () https://git.kernel.org/stable/c/c08dfb1b49492c09cf13838c71897493ea3b424e - Patch | |
References | () https://git.kernel.org/stable/c/c26c5ec832dd9e9dcd0a0a892a485c99889b68f0 - Patch | |
References | () https://git.kernel.org/stable/c/ea98284fc4fb05f276737d2043b02b62be5a8dfb - Patch | |
References | () https://git.kernel.org/stable/c/f55e003d261baa7c57d51ae5c8ec1f5c26a35c89 - Patch | |
References | () https://git.kernel.org/stable/c/f863bfd0a2c6c99011c62ea71ac04f8e78707da9 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
08 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
08 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-08 06:15
Updated : 2024-11-29 20:34
NVD link : CVE-2024-50179
Mitre link : CVE-2024-50179
CVE.ORG link : CVE-2024-50179
JSON object : View
Products Affected
linux
- linux_kernel
CWE