First published: Sun Feb 09 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() The following call-chain leads to enabling interrupts in a nested interrupt disabled section: irq_set_vcpu_affinity() irq_get_desc_lock() raw_spin_lock_irqsave() <--- Disable interrupts its_irq_set_vcpu_affinity() guard(raw_spinlock_irq) <--- Enables interrupts when leaving the guard() irq_put_desc_unlock() <--- Warns because interrupts are enabled This was broken in commit b97e8a2f7130, which replaced the original raw_spin_[un]lock() pair with guard(raw_spinlock_irq). Fix the issue by using guard(raw_spinlock). [ tglx: Massaged change log ]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Linux kernel | >=6.1.95<6.1.127 | |
Linux kernel | >=6.6.35<6.6.74 | |
Linux kernel | >=6.9.6<6.12.11 | |
Linux kernel | =6.13-rc1 | |
Linux kernel | =6.13-rc2 | |
Linux kernel | =6.13-rc3 | |
Linux kernel | =6.13-rc4 | |
Linux kernel | =6.13-rc5 | |
Linux kernel | =6.13-rc6 | |
Linux kernel | =6.13-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57949 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-57949, ensure that your Linux kernel is updated to the latest patched version that addresses this issue.
CVE-2024-57949 affects various versions of the Linux kernel.
CVE-2024-57949 is a vulnerability related to improper handling of interrupts within the Linux kernel's irqchip subsystem.
CVE-2024-57949 may allow for unexpected behavior in system interrupt handling, potentially leading to stability issues, but does not directly compromise system security.