First published: Wed May 01 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix double module refcount decrement Once the discipline is associated with the device, deleting the device takes care of decrementing the module's refcount. Doing it manually on this error path causes refcount to artificially decrease on each error while it should just stay the same.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27054 has been categorized as a moderate severity vulnerability.
To fix CVE-2024-27054, upgrade your Linux kernel to version 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1 depending on your distribution.
CVE-2024-27054 affects Linux kernel versions up to and including 5.10.226-1.
CVE-2024-27054 is related to an improper handling of module reference counts in the Linux kernel's s390/dasd component.
Yes, CVE-2024-27054 specifically affects the Debian Linux distribution.