CVE-2024-27437

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in request_irq() and subsequently disabled as necessary to align with the masked status flag. This presents a window where the interrupt could fire between these events, resulting in the IRQ incrementing the disable depth twice. This would be unrecoverable for a user since the masked flag prevents nested enables through vfio. Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx is never auto-enabled, then unmask as required.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

27 Mar 2025, 21:37

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060 - () https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060 - Patch
References () https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 - () https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 - Patch
References () https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2 - () https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2 - Patch
References () https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda - () https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda - Patch
References () https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 - () https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 - Patch
References () https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 - () https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 - Patch
References () https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec - () https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec - Patch
References () https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43 - () https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
First Time Debian debian Linux
Linux linux Kernel
Debian
Linux

21 Nov 2024, 09:04

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060 - () https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060 -
References () https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 - () https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 -
References () https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2 - () https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2 -
References () https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda - () https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda -
References () https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 - () https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 -
References () https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 - () https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 -
References () https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec - () https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec -
References () https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43 - () https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43 -

05 Nov 2024, 10:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 21:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

13 Apr 2024, 12:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 -
  • () https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 -

10 Apr 2024, 15:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/pci: deshabilita la habilitación automática de INTx IRQ exclusivo. Actualmente, para dispositivos que requieren enmascaramiento en el irqchip para INTx, es decir. En dispositivos sin soporte DisINTx, la IRQ se habilita en request_irq() y posteriormente se deshabilita según sea necesario para alinearse con el indicador de estado enmascarado. Esto presenta una ventana donde la interrupción podría dispararse entre estos eventos, lo que hace que la IRQ incremente la profundidad de desactivación dos veces. Esto sería irrecuperable para un usuario ya que el indicador enmascarado impide las habilitaciones anidadas a través de vfio. En su lugar, invierta la lógica usando IRQF_NO_AUTOEN de modo que INTx exclusivo nunca se habilite automáticamente, luego desenmascare según sea necesario.
References
  • () https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 -

05 Apr 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-05 09:15

Updated : 2025-03-27 21:37


NVD link : CVE-2024-27437

Mitre link : CVE-2024-27437

CVE.ORG link : CVE-2024-27437


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel