cve-2024-42099
Vulnerability from cvelistv5
Published
2024-07-30 07:45
Modified
2024-11-05 09:37
Severity ?
Summary
s390/dasd: Fix invalid dereferencing of indirect CCW data pointer
Impacted products
Vendor Product Version
Linux Linux Version: 6.9
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:54:31.742Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42099",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:18:08.885976Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:49.224Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/block/dasd_eckd.c",
            "drivers/s390/block/dasd_fba.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c116475f7d64",
              "status": "affected",
              "version": "c0bd39601c13",
              "versionType": "git"
            },
            {
              "lessThan": "b3a58f3b90f5",
              "status": "affected",
              "version": "c0bd39601c13",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/s390/block/dasd_eckd.c",
            "drivers/s390/block/dasd_fba.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.9"
            },
            {
              "lessThan": "6.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: Fix invalid dereferencing of indirect CCW data pointer\n\nFix invalid dereferencing of indirect CCW data pointer in\ndasd_eckd_dump_sense() that leads to a kernel panic in error cases.\n\nWhen using indirect addressing for DASD CCWs (IDAW) the CCW CDA pointer\ndoes not contain the data address itself but a pointer to the IDAL.\nThis needs to be translated from physical to virtual as well before\nusing it.\n\nThis dereferencing is also used for dasd_page_cache and also fixed\nalthough it is very unlikely that this code path ever gets used."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:37:23.185Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652"
        },
        {
          "url": "https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b"
        }
      ],
      "title": "s390/dasd: Fix invalid dereferencing of indirect CCW data pointer",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-42099",
    "datePublished": "2024-07-30T07:45:55.643Z",
    "dateReserved": "2024-07-29T15:50:41.173Z",
    "dateUpdated": "2024-11-05T09:37:23.185Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42099\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-30T08:15:02.503\",\"lastModified\":\"2024-11-21T09:33:35.880\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ns390/dasd: Fix invalid dereferencing of indirect CCW data pointer\\n\\nFix invalid dereferencing of indirect CCW data pointer in\\ndasd_eckd_dump_sense() that leads to a kernel panic in error cases.\\n\\nWhen using indirect addressing for DASD CCWs (IDAW) the CCW CDA pointer\\ndoes not contain the data address itself but a pointer to the IDAL.\\nThis needs to be translated from physical to virtual as well before\\nusing it.\\n\\nThis dereferencing is also used for dasd_page_cache and also fixed\\nalthough it is very unlikely that this code path ever gets used.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/dasd: corrige la desreferenciaci\u00f3n no v\u00e1lida del puntero de datos CCW indirecto. Se corrige la desreferenciaci\u00f3n no v\u00e1lida del puntero de datos CCW indirecto en dasd_eckd_dump_sense() que genera p\u00e1nico en el kernel en casos de error. Cuando se utiliza direccionamiento indirecto para DASD CCW (IDAW), el puntero CCW CDA no contiene la direcci\u00f3n de datos en s\u00ed, sino un puntero al IDAL. Esto tambi\u00e9n debe traducirse de f\u00edsico a virtual antes de usarlo. Esta desreferenciaci\u00f3n tambi\u00e9n se usa para dasd_page_cache y tambi\u00e9n se corrige, aunque es muy poco probable que esta ruta de c\u00f3digo se use alguna vez.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b3a58f3b90f564f42a5c35778d8c5107b2c2150b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/c116475f7d6410b1e6d399207ac75de6cf9c3652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.