Name | CVE-2024-27437 |
Description | In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in request_irq() and subsequently disabled as necessary to align with the masked status flag. This presents a window where the interrupt could fire between these events, resulting in the IRQ incrementing the disable depth twice. This would be unrecoverable for a user since the masked flag prevents nested enables through vfio. Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx is never auto-enabled, then unmask as required. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-5658-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
linux (PTS) | buster | 4.19.249-2 | vulnerable |
buster (security) | 4.19.304-1 | vulnerable | |
bullseye | 5.10.209-2 | vulnerable | |
bullseye (security) | 5.10.205-2 | vulnerable | |
bookworm | 6.1.76-1 | vulnerable | |
bookworm (security) | 6.1.85-1 | fixed | |
trixie | 6.6.15-2 | vulnerable | |
sid | 6.7.12-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux | source | bookworm | 6.1.85-1 | DSA-5658-1 | ||
linux | source | (unstable) | 6.7.12-1 |
https://git.kernel.org/linus/fe9a7082684eb059b925c535682e68c34d487d43 (6.9-rc1)