CVE-2024-26810

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
05/04/2024
Last modified:
08/04/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Lock external INTx masking ops<br /> <br /> Mask operations through config space changes to DisINTx may race INTx<br /> configuration changes via ioctl. Create wrappers that add locking for<br /> paths outside of the core interrupt code.<br /> <br /> In particular, irq_type is updated holding igate, therefore testing<br /> is_intx() requires holding igate. For example clearing DisINTx from<br /> config space can otherwise race changes of the interrupt configuration.<br /> <br /> This aligns interfaces which may trigger the INTx eventfd into two<br /> camps, one side serialized by igate and the other only enabled while<br /> INTx is configured. A subsequent patch introduces synchronization for<br /> the latter flows.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.6 (including) 5.4.274 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.215 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.154 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.84 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.3 (excluding)