### [CVE-2024-45026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5e2b17e712cf10cc3cc98fde28a88e8f1a1267e9%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:s390/dasd: fix error recovery leading to data corruption on ESE devicesExtent Space Efficient (ESE) or thin provisioned volumes need to beformatted on demand during usual IO processing.The dasd_ese_needs_format function checks for error codes that signalthe non existence of a proper track format.The check for incorrect length is to imprecise since other error casesleading to transport of insufficient data also have this flag set.This might lead to data corruption in certain error cases for exampleduring a storage server warmstart.Fix by removing the check for incorrect length and replacing byexplicitly checking for invalid track format in transport mode.Also remove the check for file protected since this is not a validESE handling case. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds