CVE-2024-27009

Source
https://cve.org/CVERecord?id=CVE-2024-27009
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27009.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27009
Downstream
Related
Published
2024-05-01T05:29:18.671Z
Modified
2026-05-18T05:55:37.255274816Z
Summary
s390/cio: fix race condition during online processing
Details

In the Linux kernel, the following vulnerability has been resolved:

s390/cio: fix race condition during online processing

A race condition exists in ccwdeviceset_online() that can cause the online process to fail, leaving the affected device in an inconsistent state. As a result, subsequent attempts to set that device online fail with return code ENODEV.

The problem occurs when a path verification request arrives after a wait for final device state completed, but before the result state is evaluated.

Fix this by ensuring that the CCW-device lock is held between determining final state and checking result state.

Note that since:

commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers")

path verification requests are much more likely to occur during boot, resulting in an increased chance of this race condition occurring.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27009.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2297791c92d04a154ad29ba5a073f9f627982110
Fixed
3076b3c38a704e10df5e143c213653309d532538
Fixed
559f3a6333397ab6cd4a696edd65a70b6be62c6e
Fixed
2df56f4ea769ff81e51bbb05699989603bde9c49
Fixed
a4234decd0fe429832ca81c4637be7248b88b49e
Fixed
2d8527f2f911fab84aec04df4788c0c23af3df48

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27009.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.157
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.88
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.29
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27009.json"