Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45026— s390/dasd: fix error recovery leading to data corruption on ESE devices

EPSS 0.03% · P7

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< 19f60a55b2fda49bc4f6134a5f6356ef62ee69d8affected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< e245a18281c252c8dbc467492e09bb5d4b012118affected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< a665e3b7ac7d5cdc26e00e3d0fc8fd490e00316aaffected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< 0a228896a1b3654cd461ff654f6a64e97a9c3246affected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< 93a7e2856951680cd7fe6ebd705ac10c8a8a5efdaffected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< 5d4a304338daf83ace2887aaacafd66fe99ed5ccaffected
5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9< 7db4042336580dfd75cb5faa82c12cd51098c90baffected
5.3affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-45026

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
s390/dasd: fix error recovery leading to data corruption on ESE devices
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix error recovery leading to data corruption on ESE devices Extent Space Efficient (ESE) or thin provisioned volumes need to be formatted on demand during usual IO processing. The dasd_ese_needs_format function checks for error codes that signal the non existence of a proper track format. The check for incorrect length is to imprecise since other error cases leading to transport of insufficient data also have this flag set. This might lead to data corruption in certain error cases for example during a storage server warmstart. Fix by removing the check for incorrect length and replacing by explicitly checking for invalid track format in transport mode. Also remove the check for file protected since this is not a valid ESE handling case.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于s390/dasd组件存在数据损坏问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9 ~ 19f60a55b2fda49bc4f6134a5f6356ef62ee69d8 -
LinuxLinux 5.3 -

II. Public POCs for CVE-2024-45026

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-45026

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-11 · 23 CVEs total

CVE-2024-45019net/mlx5e: Take state lock during tx timeout reporter
CVE-2024-45010mptcp: pm: only mark 'subflow' endp as available
CVE-2024-45009mptcp: pm: only decrement add_addr_accepted for MPJ req
CVE-2024-45011char: xillybus: Check USB endpoints when probing device
CVE-2024-45013nvme: move stopping keep-alive into nvme_uninit_ctrl()
CVE-2024-45012nouveau/firmware: use dma non-coherent allocator
CVE-2024-45015drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()
CVE-2024-45014s390/boot: Avoid possible physmem_info segment corruption
CVE-2024-45016netem: fix return value if duplicate enqueue fails
CVE-2024-45018netfilter: flowtable: initialise extack before use
CVE-2024-45017net/mlx5: Fix IPsec RoCE MPV trace call
CVE-2024-46672wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
CVE-2024-45021memcg_write_event_control(): fix a user-triggerable oops
CVE-2024-45020bpf: Fix a kernel verifier crash in stacksafe()
CVE-2024-45023md/raid1: Fix data corruption for degraded array with slow disk
CVE-2024-45022mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0
CVE-2024-45024mm/hugetlb: fix hugetlb vs. core-mm PT locking
CVE-2024-45025fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
CVE-2024-45027usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()
CVE-2024-45029i2c: tegra: Do not mark ACPI devices as irq safe

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-45026

No comments yet


Leave a comment