CVE-2024-27437

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/04/2024
Last modified:
27/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Disable auto-enable of exclusive INTx IRQ<br /> <br /> Currently for devices requiring masking at the irqchip for INTx, ie.<br /> devices without DisINTx support, the IRQ is enabled in request_irq()<br /> and subsequently disabled as necessary to align with the masked status<br /> flag. This presents a window where the interrupt could fire between<br /> these events, resulting in the IRQ incrementing the disable depth twice.<br /> This would be unrecoverable for a user since the masked flag prevents<br /> nested enables through vfio.<br /> <br /> Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx<br /> is never auto-enabled, then unmask as required.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.6 (including) 6.1.84 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.3 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8.4 (including) 6.8.12 (including)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*