๐Ÿ” CVE Alert

CVE-2024-50179

MEDIUM 5.5

ceph: remove the incorrect Fw reference check when dirtying pages

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ceph: remove the incorrect Fw reference check when dirtying pages When doing the direct-io reads it will also try to mark pages dirty, but for the read path it won't hold the Fw caps and there is case will it get the Fw reference.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 8, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < c26c5ec832dd9e9dcd0a0a892a485c99889b68f0 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < 126b567a2ef65fc38a71d832bf1216c56816f231 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < f55e003d261baa7c57d51ae5c8ec1f5c26a35c89 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < f863bfd0a2c6c99011c62ea71ac04f8e78707da9 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < ea98284fc4fb05f276737d2043b02b62be5a8dfb 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < 11ab19d48ab877430eed0c7d83810970bbcbc4f6 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < 9d4f619153bab7fa59736462967821d6521a38cb 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < 74b302ebad5b43ac17460fa58092d892a3cba6eb 5dda377cf0a6bd43f64a3c1efb670d7c668e7b29 < c08dfb1b49492c09cf13838c71897493ea3b424e
Linux / Linux
4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c26c5ec832dd9e9dcd0a0a892a485c99889b68f0 git.kernel.org: https://git.kernel.org/stable/c/126b567a2ef65fc38a71d832bf1216c56816f231 git.kernel.org: https://git.kernel.org/stable/c/f55e003d261baa7c57d51ae5c8ec1f5c26a35c89 git.kernel.org: https://git.kernel.org/stable/c/f863bfd0a2c6c99011c62ea71ac04f8e78707da9 git.kernel.org: https://git.kernel.org/stable/c/ea98284fc4fb05f276737d2043b02b62be5a8dfb git.kernel.org: https://git.kernel.org/stable/c/11ab19d48ab877430eed0c7d83810970bbcbc4f6 git.kernel.org: https://git.kernel.org/stable/c/9d4f619153bab7fa59736462967821d6521a38cb git.kernel.org: https://git.kernel.org/stable/c/74b302ebad5b43ac17460fa58092d892a3cba6eb git.kernel.org: https://git.kernel.org/stable/c/c08dfb1b49492c09cf13838c71897493ea3b424e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html