CVE-2024-27009
Vulnerability from cvelistv5
Published
2024-05-01 05:29
Modified
2024-11-05 09:19
Severity ?
Summary
s390/cio: fix race condition during online processing
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:21:05.872Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-27009",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:44:43.675046Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:38.137Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/cio/device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "3076b3c38a70",
              "status": "affected",
              "version": "2297791c92d0",
              "versionType": "git"
            },
            {
              "lessThan": "559f3a633339",
              "status": "affected",
              "version": "2297791c92d0",
              "versionType": "git"
            },
            {
              "lessThan": "2df56f4ea769",
              "status": "affected",
              "version": "2297791c92d0",
              "versionType": "git"
            },
            {
              "lessThan": "a4234decd0fe",
              "status": "affected",
              "version": "2297791c92d0",
              "versionType": "git"
            },
            {
              "lessThan": "2d8527f2f911",
              "status": "affected",
              "version": "2297791c92d0",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/cio/device.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.15"
            },
            {
              "lessThan": "5.15",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.157",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.88",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.29",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cio: fix race condition during online processing\n\nA race condition exists in ccw_device_set_online() that can cause the\nonline process to fail, leaving the affected device in an inconsistent\nstate. As a result, subsequent attempts to set that device online fail\nwith return code ENODEV.\n\nThe problem occurs when a path verification request arrives after\na wait for final device state completed, but before the result state\nis evaluated.\n\nFix this by ensuring that the CCW-device lock is held between\ndetermining final state and checking result state.\n\nNote that since:\n\ncommit 2297791c92d0 (\"s390/cio: dont unregister subchannel from child-drivers\")\n\npath verification requests are much more likely to occur during boot,\nresulting in an increased chance of this race condition occurring."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:19:52.207Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538"
        },
        {
          "url": "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e"
        },
        {
          "url": "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49"
        },
        {
          "url": "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e"
        },
        {
          "url": "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48"
        }
      ],
      "title": "s390/cio: fix race condition during online processing",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-27009",
    "datePublished": "2024-05-01T05:29:18.671Z",
    "dateReserved": "2024-02-19T14:20:24.208Z",
    "dateUpdated": "2024-11-05T09:19:52.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-27009\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T06:15:19.360\",\"lastModified\":\"2024-05-13T08:15:11.870\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/cio: corrige la condici\u00f3n de ejecuci\u00f3n durante el procesamiento en l\u00ednea Existe una condici\u00f3n de ejecuci\u00f3n en ccw_device_set_online() que puede causar que el proceso en l\u00ednea falle, dejando el dispositivo afectado en un estado inconsistente. Como resultado, los intentos posteriores de configurar ese dispositivo en l\u00ednea fallan con el c\u00f3digo de retorno ENODEV. El problema se produce cuando llega una solicitud de verificaci\u00f3n de ruta despu\u00e9s de que se complete la espera hasta que se complete el estado final del dispositivo, pero antes de que se eval\u00fae el estado del resultado. Solucione este problema asegur\u00e1ndose de que el bloqueo del dispositivo CCW se mantenga entre la determinaci\u00f3n del estado final y la verificaci\u00f3n del estado del resultado. Tenga en cuenta que desde: commit 2297791c92d0 (\\\"s390/cio: no cancelar el registro del subcanal de los controladores secundarios\\\") es mucho m\u00e1s probable que se produzcan solicitudes de verificaci\u00f3n de ruta durante el arranque, lo que aumenta las posibilidades de que se produzca esta condici\u00f3n de ejecuci\u00f3n.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.