๐Ÿ” CVE Alert

CVE-2024-57949

MEDIUM 5.5

irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() The following call-chain leads to enabling interrupts in a nested interrupt disabled section: irq_set_vcpu_affinity() irq_get_desc_lock() raw_spin_lock_irqsave() <--- Disable interrupts its_irq_set_vcpu_affinity() guard(raw_spinlock_irq) <--- Enables interrupts when leaving the guard() irq_put_desc_unlock() <--- Warns because interrupts are enabled This was broken in commit b97e8a2f7130, which replaced the original raw_spin_[un]lock() pair with guard(raw_spinlock_irq). Fix the issue by using guard(raw_spinlock). [ tglx: Massaged change log ]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 9, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2458f2362f695584bd824c922caa07ffc4fe0d5c < d7b0e89610dd45ac6cf0d6f99bfa9ccc787db344 5c0fb9cb404a2efbbc319ff9d1b877cf4e47e950 < 6c84ff2e788fce0099ee3e71a3ed258b1ca1a223 b97e8a2f7130a4b30d1502003095833d16c028b3 < 93955a7788121ab5a0f7f27e988b2ed1135a4866 b97e8a2f7130a4b30d1502003095833d16c028b3 < 35cb2c6ce7da545f3b5cb1e6473ad7c3a6f08310 c11039edbabdbccf0728844f1002d750d06f9eff
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d7b0e89610dd45ac6cf0d6f99bfa9ccc787db344 git.kernel.org: https://git.kernel.org/stable/c/6c84ff2e788fce0099ee3e71a3ed258b1ca1a223 git.kernel.org: https://git.kernel.org/stable/c/93955a7788121ab5a0f7f27e988b2ed1135a4866 git.kernel.org: https://git.kernel.org/stable/c/35cb2c6ce7da545f3b5cb1e6473ad7c3a6f08310 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html