In the Linux kernel, the following vulnerability has been resolved:
net: txgbe: free isb resources at the right time
When using MSI/INTx interrupt, the shared interrupts are still being
handled in the device remove routine, before free IRQs. So isb memory
is still read after it is freed. Thus move wx_free_isb_resources()
from txgbe_close() to txgbe_remove(). And fix the improper isb free
action in txgbe_open() error handling path.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gcp | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-ibm | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-lowlatency | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-nvidia | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-nvidia-6.8 | < any | UNKNOWN |
git.kernel.org/linus/935124dd5883b5de68dc5a94f582480a10643dc9 (6.10-rc7)
git.kernel.org/stable/c/935124dd5883b5de68dc5a94f582480a10643dc9
git.kernel.org/stable/c/efdc3f54299835ddef23bea651c753c4d467010b
launchpad.net/bugs/cve/CVE-2024-42112
nvd.nist.gov/vuln/detail/CVE-2024-42112
security-tracker.debian.org/tracker/CVE-2024-42112
www.cve.org/CVERecord?id=CVE-2024-42112