CVE-2024-27009 (GCVE-0-2024-27009)

Vulnerability from cvelistv5 – Published: 2024-05-01 05:29 – Updated: 2025-11-04 17:16
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: s390/cio: fix race condition during online processing A race condition exists in ccw_device_set_online() that can cause the online process to fail, leaving the affected device in an inconsistent state. As a result, subsequent attempts to set that device online fail with return code ENODEV. The problem occurs when a path verification request arrives after a wait for final device state completed, but before the result state is evaluated. Fix this by ensuring that the CCW-device lock is held between determining final state and checking result state. Note that since: commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") path verification requests are much more likely to occur during boot, resulting in an increased chance of this race condition occurring.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 2297791c92d04a154ad29ba5a073f9f627982110 , < 3076b3c38a704e10df5e143c213653309d532538 (git)
Affected: 2297791c92d04a154ad29ba5a073f9f627982110 , < 559f3a6333397ab6cd4a696edd65a70b6be62c6e (git)
Affected: 2297791c92d04a154ad29ba5a073f9f627982110 , < 2df56f4ea769ff81e51bbb05699989603bde9c49 (git)
Affected: 2297791c92d04a154ad29ba5a073f9f627982110 , < a4234decd0fe429832ca81c4637be7248b88b49e (git)
Affected: 2297791c92d04a154ad29ba5a073f9f627982110 , < 2d8527f2f911fab84aec04df4788c0c23af3df48 (git)
Create a notification for this product.
    Linux Linux Affected: 5.15
Unaffected: 0 , < 5.15 (semver)
Unaffected: 5.15.157 , ≤ 5.15.* (semver)
Unaffected: 6.1.88 , ≤ 6.1.* (semver)
Unaffected: 6.6.29 , ≤ 6.6.* (semver)
Unaffected: 6.8.8 , ≤ 6.8.* (semver)
Unaffected: 6.9 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-04T17:16:50.377Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48"
          },
          {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/"
          },
          {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/"
          },
          {
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27009",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:44:43.675046Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:38.137Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/cio/device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3076b3c38a704e10df5e143c213653309d532538",
              "status": "affected",
              "version": "2297791c92d04a154ad29ba5a073f9f627982110",
              "versionType": "git"
            },
            {
              "lessThan": "559f3a6333397ab6cd4a696edd65a70b6be62c6e",
              "status": "affected",
              "version": "2297791c92d04a154ad29ba5a073f9f627982110",
              "versionType": "git"
            },
            {
              "lessThan": "2df56f4ea769ff81e51bbb05699989603bde9c49",
              "status": "affected",
              "version": "2297791c92d04a154ad29ba5a073f9f627982110",
              "versionType": "git"
            },
            {
              "lessThan": "a4234decd0fe429832ca81c4637be7248b88b49e",
              "status": "affected",
              "version": "2297791c92d04a154ad29ba5a073f9f627982110",
              "versionType": "git"
            },
            {
              "lessThan": "2d8527f2f911fab84aec04df4788c0c23af3df48",
              "status": "affected",
              "version": "2297791c92d04a154ad29ba5a073f9f627982110",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/cio/device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.15"
            },
            {
              "lessThan": "5.15",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.157",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.88",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.29",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.157",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.88",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.29",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.8.8",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cio: fix race condition during online processing\n\nA race condition exists in ccw_device_set_online() that can cause the\nonline process to fail, leaving the affected device in an inconsistent\nstate. As a result, subsequent attempts to set that device online fail\nwith return code ENODEV.\n\nThe problem occurs when a path verification request arrives after\na wait for final device state completed, but before the result state\nis evaluated.\n\nFix this by ensuring that the CCW-device lock is held between\ndetermining final state and checking result state.\n\nNote that since:\n\ncommit 2297791c92d0 (\"s390/cio: dont unregister subchannel from child-drivers\")\n\npath verification requests are much more likely to occur during boot,\nresulting in an increased chance of this race condition occurring."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:02:04.984Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538"
        },
        {
          "url": "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e"
        },
        {
          "url": "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49"
        },
        {
          "url": "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e"
        },
        {
          "url": "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48"
        }
      ],
      "title": "s390/cio: fix race condition during online processing",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-27009",
    "datePublished": "2024-05-01T05:29:18.671Z",
    "dateReserved": "2024-02-19T14:20:24.208Z",
    "dateUpdated": "2025-11-04T17:16:50.377Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: s390/cio: corrige la condici\\u00f3n de ejecuci\\u00f3n durante el procesamiento en l\\u00ednea Existe una condici\\u00f3n de ejecuci\\u00f3n en ccw_device_set_online() que puede causar que el proceso en l\\u00ednea falle, dejando el dispositivo afectado en un estado inconsistente. Como resultado, los intentos posteriores de configurar ese dispositivo en l\\u00ednea fallan con el c\\u00f3digo de retorno ENODEV. El problema se produce cuando llega una solicitud de verificaci\\u00f3n de ruta despu\\u00e9s de que se complete la espera hasta que se complete el estado final del dispositivo, pero antes de que se eval\\u00fae el estado del resultado. Solucione este problema asegur\\u00e1ndose de que el bloqueo del dispositivo CCW se mantenga entre la determinaci\\u00f3n del estado final y la verificaci\\u00f3n del estado del resultado. Tenga en cuenta que desde: commit 2297791c92d0 (\\\"s390/cio: no cancelar el registro del subcanal de los controladores secundarios\\\") es mucho m\\u00e1s probable que se produzcan solicitudes de verificaci\\u00f3n de ruta durante el arranque, lo que aumenta las posibilidades de que se produzca esta condici\\u00f3n de ejecuci\\u00f3n.\"}]",
      "id": "CVE-2024-27009",
      "lastModified": "2024-11-21T09:03:36.687",
      "published": "2024-05-01T06:15:19.360",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-27009\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T06:15:19.360\",\"lastModified\":\"2025-11-04T18:16:10.513\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/cio: corrige la condici\u00f3n de ejecuci\u00f3n durante el procesamiento en l\u00ednea Existe una condici\u00f3n de ejecuci\u00f3n en ccw_device_set_online() que puede causar que el proceso en l\u00ednea falle, dejando el dispositivo afectado en un estado inconsistente. Como resultado, los intentos posteriores de configurar ese dispositivo en l\u00ednea fallan con el c\u00f3digo de retorno ENODEV. El problema se produce cuando llega una solicitud de verificaci\u00f3n de ruta despu\u00e9s de que se complete la espera hasta que se complete el estado final del dispositivo, pero antes de que se eval\u00fae el estado del resultado. Solucione este problema asegur\u00e1ndose de que el bloqueo del dispositivo CCW se mantenga entre la determinaci\u00f3n del estado final y la verificaci\u00f3n del estado del resultado. Tenga en cuenta que desde: commit 2297791c92d0 (\\\"s390/cio: no cancelar el registro del subcanal de los controladores secundarios\\\") es mucho m\u00e1s probable que se produzcan solicitudes de verificaci\u00f3n de ruta durante el arranque, lo que aumenta las posibilidades de que se produzca esta condici\u00f3n de ejecuci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15\",\"versionEndExcluding\":\"5.15.157\",\"matchCriteriaId\":\"182116A5-ED53-4B3F-BB25-662CBF1602D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.88\",\"matchCriteriaId\":\"B665F958-644E-434D-A78D-CCD1628D1774\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.29\",\"matchCriteriaId\":\"0999E154-1E68-41FA-8DE3-9A735E382224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.8.8\",\"matchCriteriaId\":\"673B3328-389D-41A4-9617-669298635262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"22BEDD49-2C6D-402D-9DBF-6646F6ECD10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52048DDA-FC5A-4363-95A0-A6357B4D7F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06B2CCF-3F43-4FA9-8773-C83C3F5764B2\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:21:05.872Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27009\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:44:43.675046Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:17.776Z\"}}], \"cna\": {\"title\": \"s390/cio: fix race condition during online processing\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"3076b3c38a704e10df5e143c213653309d532538\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"2df56f4ea769ff81e51bbb05699989603bde9c49\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"a4234decd0fe429832ca81c4637be7248b88b49e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"2d8527f2f911fab84aec04df4788c0c23af3df48\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/s390/cio/device.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.157\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.88\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.29\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.8.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/s390/cio/device.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\"}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\"}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\"}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\"}, {\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.157\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.88\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.29\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8.8\", \"versionStartIncluding\": \"5.15\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9\", \"versionStartIncluding\": \"5.15\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:02:04.984Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-27009\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:02:04.984Z\", \"dateReserved\": \"2024-02-19T14:20:24.208Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-01T05:29:18.671Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…