๐Ÿ” CVE Alert

CVE-2024-44969

UNKNOWN 0.0

s390/sclp: Prevent release of buffer in I/O

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: s390/sclp: Prevent release of buffer in I/O When a task waiting for completion of a Store Data operation is interrupted, an attempt is made to halt this operation. If this attempt fails due to a hardware or firmware problem, there is a chance that the SCLP facility might store data into buffers referenced by the original operation at a later time. Handle this situation by not releasing the referenced data buffers if the halt attempt fails. For current use cases, this might result in a leak of few pages of memory in case of a rare hardware/firmware malfunction.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
66aec647216f129b8560dba738303a8486481c53 < 7a7e60ed23d471a07dbbe72565d2992ee8244bbe 66aec647216f129b8560dba738303a8486481c53 < 1ec5ea9e25f582fd6999393e2f2c3bf56f234e05 66aec647216f129b8560dba738303a8486481c53 < a3e52a4c22c846858a6875e1c280030a3849e148 66aec647216f129b8560dba738303a8486481c53 < a88a49473c94ccfd8dce1e766aacf3c627278463 66aec647216f129b8560dba738303a8486481c53 < 46f67233b011385d53cf14d272431755de3a7c79 66aec647216f129b8560dba738303a8486481c53 < 1e8b7fb427af6b2ddd54eff66a6b428a81c96633 66aec647216f129b8560dba738303a8486481c53 < 2429ea3b4330e3653b72b210a0d5f2a717359506 66aec647216f129b8560dba738303a8486481c53 < bf365071ea92b9579d5a272679b74052a5643e35
Linux / Linux
4.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7a7e60ed23d471a07dbbe72565d2992ee8244bbe git.kernel.org: https://git.kernel.org/stable/c/1ec5ea9e25f582fd6999393e2f2c3bf56f234e05 git.kernel.org: https://git.kernel.org/stable/c/a3e52a4c22c846858a6875e1c280030a3849e148 git.kernel.org: https://git.kernel.org/stable/c/a88a49473c94ccfd8dce1e766aacf3c627278463 git.kernel.org: https://git.kernel.org/stable/c/46f67233b011385d53cf14d272431755de3a7c79 git.kernel.org: https://git.kernel.org/stable/c/1e8b7fb427af6b2ddd54eff66a6b428a81c96633 git.kernel.org: https://git.kernel.org/stable/c/2429ea3b4330e3653b72b210a0d5f2a717359506 git.kernel.org: https://git.kernel.org/stable/c/bf365071ea92b9579d5a272679b74052a5643e35 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html