Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix potential double remove of hotplug slot In commit 6ee600bfbe0f ("s390/pci: remove hotplug slot when releasing the device") the zpci_exit_slot() was moved from zpci_device_reserved() to zpci_release_device() with the intention of keeping the hotplug slot around until the device is actually removed. Now zpci_release_device() is only called once all references are dropped. Since the zPCI subsystem only drops its reference once the device is in the reserved state it follows that zpci_release_device() must only deal with devices in the reserved state. Despite that it contains code to tear down from both configured and standby state. For the standby case this already includes the removal of the hotplug slot so would cause a double removal if a device was ever removed in either configured or standby state. Instead of causing a potential double removal in a case that should never happen explicitly WARN_ON() if a device in non-reserved state is released and get rid of the dead code cases.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.9, < 6.11.11 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/371bd905599d18da62d75e3974acbf6a41e315c7Patch
- https://git.kernel.org/stable/c/c1489651071ab1be46d2af1da8adb15c9fc3c069Patch
- https://git.kernel.org/stable/c/c4a585e952ca403a370586d3f16e8331a7564901Patch
FAQ
What is CVE-2024-56699?
CVE-2024-56699 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix potential double remove of hotplug slot In commit 6ee600bfbe0f ("s390/pci: remove hotplug slot when releasing the de...
How severe is CVE-2024-56699?
CVE-2024-56699 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-56699?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.