{"id":"CVE-2024-27054","summary":"s390/dasd: fix double module refcount decrement","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ns390/dasd: fix double module refcount decrement\n\nOnce the discipline is associated with the device, deleting the device\ntakes care of decrementing the module's refcount.  Doing it manually on\nthis error path causes refcount to artificially decrease on each error\nwhile it should just stay the same.","modified":"2026-04-02T10:06:57.877046Z","published":"2024-05-01T12:54:49.441Z","related":["SUSE-SU-2024:1643-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1870-1","SUSE-SU-2024:1983-1","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2184-1","SUSE-SU-2024:2190-1","SUSE-SU-2025:0834-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27054.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/9fe0562179d8fa960afca0eaed6d4ba4122a3cc6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad999aa18103fa038787b6a8a55020abcf34df1a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3116e62ddeff79cae342147753ce596f01fcf06"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ebc5a3bd79e54f98c885c26f0862a27a02c487c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec09bcab32fc4765e0cc97e1b72cdd067135f37e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/edbdb0d94143db46edd373cc93e433832d29fe19"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fa18aa507ea71d8914b6acb2c94db311c757c650"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27054.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27054"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c020d722b110a44c613ef71e657e6dd4116e09d9"},{"fixed":"9fe0562179d8fa960afca0eaed6d4ba4122a3cc6"},{"fixed":"edbdb0d94143db46edd373cc93e433832d29fe19"},{"fixed":"ad999aa18103fa038787b6a8a55020abcf34df1a"},{"fixed":"ec09bcab32fc4765e0cc97e1b72cdd067135f37e"},{"fixed":"fa18aa507ea71d8914b6acb2c94db311c757c650"},{"fixed":"ebc5a3bd79e54f98c885c26f0862a27a02c487c5"},{"fixed":"c3116e62ddeff79cae342147753ce596f01fcf06"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27054.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}