Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-27437", "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "state": "PUBLISHED", "assignerShortName": "Linux", "dateReserved": "2024-02-25T13:47:42.687Z", "datePublished": "2024-04-05T08:24:44.561Z", "dateUpdated": "2024-12-19T08:54:54.878Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux", "dateUpdated": "2024-12-19T08:54:54.878Z"}, "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required."}], "affected": [{"product": "Linux", "vendor": "Linux", "defaultStatus": "unaffected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["drivers/vfio/pci/vfio_pci_intrs.c"], "versions": [{"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "26389925d6c2126fb777821a0a983adca7ee6351", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "561d5e1998d58b54ce2bbbb3e843b669aa0b3db5", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "b7a2f0955ffceffadfe098b40b50307431f45438", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "139dfcc4d723ab13469881200c7d80f49d776060", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "2a4a666c45107206605b7b5bc20545f8aabc4fa2", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "3b3491ad0f80d913e7d255941d4470f4a4d9bfda", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "bf0bc84a20e6109ab07d5dc072067bd01eb931ec", "status": "affected", "versionType": "git"}, {"version": "89e1f7d4c66d85f42c3d52ea3866eb10cadf6153", "lessThan": "fe9a7082684eb059b925c535682e68c34d487d43", "status": "affected", "versionType": "git"}]}, {"product": "Linux", "vendor": "Linux", "defaultStatus": "affected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["drivers/vfio/pci/vfio_pci_intrs.c"], "versions": [{"version": "3.6", "status": "affected"}, {"version": "0", "lessThan": "3.6", "status": "unaffected", "versionType": "semver"}, {"version": "5.4.274", "lessThanOrEqual": "5.4.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.10.215", "lessThanOrEqual": "5.10.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.15.154", "lessThanOrEqual": "5.15.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.1.84", "lessThanOrEqual": "6.1.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.6.24", "lessThanOrEqual": "6.6.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.7.12", "lessThanOrEqual": "6.7.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.8.3", "lessThanOrEqual": "6.8.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.9", "lessThanOrEqual": "*", "status": "unaffected", "versionType": "original_commit_for_fix"}]}], "references": [{"url": "https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351"}, {"url": "https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5"}, {"url": "https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438"}, {"url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060"}, {"url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2"}, {"url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda"}, {"url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec"}, {"url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43"}], "title": "vfio/pci: Disable auto-enable of exclusive INTx IRQ", "x_generator": {"engine": "bippy-5f407fcff5a0"}}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-04-05T13:39:05.639772Z", "id": "CVE-2024-27437", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-06T19:03:26.352Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T00:34:52.326Z"}, "title": "CVE Program Container", "references": [{"url": "https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43", "tags": ["x_transferred"]}, {"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "tags": ["x_transferred"]}]}]}, "dataVersion": "5.1"}