CVE-2024-27437

Source
https://cve.org/CVERecord?id=CVE-2024-27437
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27437.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27437
Downstream
Related
Published
2024-04-05T08:24:44.561Z
Modified
2026-03-13T07:53:45.974639Z
Summary
vfio/pci: Disable auto-enable of exclusive INTx IRQ
Details

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Disable auto-enable of exclusive INTx IRQ

Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in request_irq() and subsequently disabled as necessary to align with the masked status flag. This presents a window where the interrupt could fire between these events, resulting in the IRQ incrementing the disable depth twice. This would be unrecoverable for a user since the masked flag prevents nested enables through vfio.

Instead, invert the logic using IRQFNOAUTOEN such that exclusive INTx is never auto-enabled, then unmask as required.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27437.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
89e1f7d4c66d85f42c3d52ea3866eb10cadf6153
Fixed
26389925d6c2126fb777821a0a983adca7ee6351
Fixed
561d5e1998d58b54ce2bbbb3e843b669aa0b3db5
Fixed
b7a2f0955ffceffadfe098b40b50307431f45438
Fixed
139dfcc4d723ab13469881200c7d80f49d776060
Fixed
2a4a666c45107206605b7b5bc20545f8aabc4fa2
Fixed
3b3491ad0f80d913e7d255941d4470f4a4d9bfda
Fixed
bf0bc84a20e6109ab07d5dc072067bd01eb931ec
Fixed
fe9a7082684eb059b925c535682e68c34d487d43

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27437.json"