2024-07-30 14:03:15 +00:00

29 lines
1.8 KiB
JSON

{
"id": "CVE-2024-42150",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:06.620",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: txgbe: remove separate irq request for MSI and INTx\n\nWhen using MSI or INTx interrupts, request_irq() for pdev->irq will\nconflict with request_threaded_irq() for txgbe->misc.irq, to cause\nsystem crash. So remove txgbe_request_irq() for MSI/INTx case, and\nrename txgbe_request_msix_irqs() since it only request for queue irqs.\n\nAdd wx->misc_irq_domain to determine whether the driver creates an IRQ\ndomain and threaded request the IRQs."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: txgbe: elimina la solicitud irq separada para MSI e INTx Cuando se usan interrupciones MSI o INTx, request_irq() para pdev->irq entrar\u00e1 en conflicto con request_threaded_irq() para txgbe->misc .irq, para provocar un fallo del sistema. Por lo tanto, elimine txgbe_request_irq() para el caso MSI/INTx y cambie el nombre de txgbe_request_msix_irqs() ya que solo solicita irqs en cola. Agregue wx->misc_irq_domain para determinar si el controlador crea un dominio IRQ y solicita por subprocesos las IRQ."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/850103ebe6b062ee0ab0f6670205f861acc76ace",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bd07a98178462e7a02ed2bf7dec90a00944c1da5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}