cve-2024-27009
Vulnerability from cvelistv5
Published
2024-05-01 05:29
Modified
2024-12-19 08:52
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: s390/cio: fix race condition during online processing A race condition exists in ccw_device_set_online() that can cause the online process to fail, leaving the affected device in an inconsistent state. As a result, subsequent attempts to set that device online fail with return code ENODEV. The problem occurs when a path verification request arrives after a wait for final device state completed, but before the result state is evaluated. Fix this by ensuring that the CCW-device lock is held between determining final state and checking result state. Note that since: commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers") path verification requests are much more likely to occur during boot, resulting in an increased chance of this race condition occurring.
Impacted products
Vendor Product Version
Linux Linux Version: 2297791c92d04a154ad29ba5a073f9f627982110
Version: 2297791c92d04a154ad29ba5a073f9f627982110
Version: 2297791c92d04a154ad29ba5a073f9f627982110
Version: 2297791c92d04a154ad29ba5a073f9f627982110
Version: 2297791c92d04a154ad29ba5a073f9f627982110
Create a notification for this product.
   Linux Linux Version: 5.15
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T00:21:05.872Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-27009",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T15:44:43.675046Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T17:33:38.137Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/s390/cio/device.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "3076b3c38a704e10df5e143c213653309d532538",
                     status: "affected",
                     version: "2297791c92d04a154ad29ba5a073f9f627982110",
                     versionType: "git",
                  },
                  {
                     lessThan: "559f3a6333397ab6cd4a696edd65a70b6be62c6e",
                     status: "affected",
                     version: "2297791c92d04a154ad29ba5a073f9f627982110",
                     versionType: "git",
                  },
                  {
                     lessThan: "2df56f4ea769ff81e51bbb05699989603bde9c49",
                     status: "affected",
                     version: "2297791c92d04a154ad29ba5a073f9f627982110",
                     versionType: "git",
                  },
                  {
                     lessThan: "a4234decd0fe429832ca81c4637be7248b88b49e",
                     status: "affected",
                     version: "2297791c92d04a154ad29ba5a073f9f627982110",
                     versionType: "git",
                  },
                  {
                     lessThan: "2d8527f2f911fab84aec04df4788c0c23af3df48",
                     status: "affected",
                     version: "2297791c92d04a154ad29ba5a073f9f627982110",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/s390/cio/device.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.15",
                  },
                  {
                     lessThan: "5.15",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.157",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.88",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.29",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.8.*",
                     status: "unaffected",
                     version: "6.8.8",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.9",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/cio: fix race condition during online processing\n\nA race condition exists in ccw_device_set_online() that can cause the\nonline process to fail, leaving the affected device in an inconsistent\nstate. As a result, subsequent attempts to set that device online fail\nwith return code ENODEV.\n\nThe problem occurs when a path verification request arrives after\na wait for final device state completed, but before the result state\nis evaluated.\n\nFix this by ensuring that the CCW-device lock is held between\ndetermining final state and checking result state.\n\nNote that since:\n\ncommit 2297791c92d0 (\"s390/cio: dont unregister subchannel from child-drivers\")\n\npath verification requests are much more likely to occur during boot,\nresulting in an increased chance of this race condition occurring.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T08:52:25.504Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538",
            },
            {
               url: "https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e",
            },
            {
               url: "https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49",
            },
            {
               url: "https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e",
            },
            {
               url: "https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48",
            },
         ],
         title: "s390/cio: fix race condition during online processing",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-27009",
      datePublished: "2024-05-01T05:29:18.671Z",
      dateReserved: "2024-02-19T14:20:24.208Z",
      dateUpdated: "2024-12-19T08:52:25.504Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-27009\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-01T06:15:19.360\",\"lastModified\":\"2024-11-21T09:03:36.687\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: s390/cio: corrige la condición de ejecución durante el procesamiento en línea Existe una condición de ejecución en ccw_device_set_online() que puede causar que el proceso en línea falle, dejando el dispositivo afectado en un estado inconsistente. Como resultado, los intentos posteriores de configurar ese dispositivo en línea fallan con el código de retorno ENODEV. El problema se produce cuando llega una solicitud de verificación de ruta después de que se complete la espera hasta que se complete el estado final del dispositivo, pero antes de que se evalúe el estado del resultado. Solucione este problema asegurándose de que el bloqueo del dispositivo CCW se mantenga entre la determinación del estado final y la verificación del estado del resultado. Tenga en cuenta que desde: commit 2297791c92d0 (\\\"s390/cio: no cancelar el registro del subcanal de los controladores secundarios\\\") es mucho más probable que se produzcan solicitudes de verificación de ruta durante el arranque, lo que aumenta las posibilidades de que se produzca esta condición de ejecución.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:21:05.872Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-27009\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:44:43.675046Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:17.776Z\"}}], \"cna\": {\"title\": \"s390/cio: fix race condition during online processing\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"3076b3c38a704e10df5e143c213653309d532538\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"559f3a6333397ab6cd4a696edd65a70b6be62c6e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"2df56f4ea769ff81e51bbb05699989603bde9c49\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"a4234decd0fe429832ca81c4637be7248b88b49e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2297791c92d04a154ad29ba5a073f9f627982110\", \"lessThan\": \"2d8527f2f911fab84aec04df4788c0c23af3df48\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/s390/cio/device.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.157\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.88\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.29\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.8.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/s390/cio/device.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538\"}, {\"url\": \"https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e\"}, {\"url\": \"https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49\"}, {\"url\": \"https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e\"}, {\"url\": \"https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/cio: fix race condition during online processing\\n\\nA race condition exists in ccw_device_set_online() that can cause the\\nonline process to fail, leaving the affected device in an inconsistent\\nstate. As a result, subsequent attempts to set that device online fail\\nwith return code ENODEV.\\n\\nThe problem occurs when a path verification request arrives after\\na wait for final device state completed, but before the result state\\nis evaluated.\\n\\nFix this by ensuring that the CCW-device lock is held between\\ndetermining final state and checking result state.\\n\\nNote that since:\\n\\ncommit 2297791c92d0 (\\\"s390/cio: dont unregister subchannel from child-drivers\\\")\\n\\npath verification requests are much more likely to occur during boot,\\nresulting in an increased chance of this race condition occurring.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:52:25.504Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-27009\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:52:25.504Z\", \"dateReserved\": \"2024-02-19T14:20:24.208Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-01T05:29:18.671Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.