CVE-2024-27009
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
01/05/2024
Last modified:
04/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/cio: fix race condition during online processing<br />
<br />
A race condition exists in ccw_device_set_online() that can cause the<br />
online process to fail, leaving the affected device in an inconsistent<br />
state. As a result, subsequent attempts to set that device online fail<br />
with return code ENODEV.<br />
<br />
The problem occurs when a path verification request arrives after<br />
a wait for final device state completed, but before the result state<br />
is evaluated.<br />
<br />
Fix this by ensuring that the CCW-device lock is held between<br />
determining final state and checking result state.<br />
<br />
Note that since:<br />
<br />
commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers")<br />
<br />
path verification requests are much more likely to occur during boot,<br />
resulting in an increased chance of this race condition occurring.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.157 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.29 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48
- https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49
- https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538
- https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e
- https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e
- https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48
- https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49
- https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538
- https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e
- https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/



