Количество 19
Количество 19
CVE-2025-40048
In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”. Us...
CVE-2025-40048
In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”. U
CVE-2025-40048
uio_hv_generic: Let userspace take care of interrupt mask
CVE-2025-40048
In the Linux kernel, the following vulnerability has been resolved: u ...
GHSA-hw92-4498-rgw4
In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”...
BDU:2025-13624
Уязвимость модуля drivers/uio/uio_hv_generic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2026:0029-1
Security update for the Linux Kernel
SUSE-SU-2025:4506-1
Security update for the Linux Kernel
SUSE-SU-2025:4515-1
Security update for the Linux Kernel
ELSA-2025-28040
ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4521-1
Security update for the Linux Kernel
SUSE-SU-2025:4505-1
Security update for the Linux Kernel
SUSE-SU-2025:4422-1
Security update for the Linux Kernel
ELSA-2025-28049
ELSA-2025-28049: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4516-1
Security update for the Linux Kernel
SUSE-SU-2025:4393-1
Security update for the Linux Kernel
SUSE-SU-2025:4517-1
Security update for the Linux Kernel
ELSA-2025-28048
ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT)
openSUSE-SU-2025:20091-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40048 In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”. Us... | 0% Низкий | 3 месяца назад | ||
CVE-2025-40048 In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”. U | 0% Низкий | 3 месяца назад | ||
CVE-2025-40048 uio_hv_generic: Let userspace take care of interrupt mask | CVSS3: 8.4 | 0% Низкий | 3 месяца назад | |
CVE-2025-40048 In the Linux kernel, the following vulnerability has been resolved: u ... | 0% Низкий | 3 месяца назад | ||
GHSA-hw92-4498-rgw4 In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the ring, the mask bit may be set when it is supposed to be clear, and the user-mode driver will miss an interrupt which will cause a hang. For eg- when the driver sets inbound ring buffer interrupt mask to 1, the host does not interrupt the guest on the UIO VMBus channel. However, setting the mask does not prevent the host from putting a message in the inbound ring buffer. So let’s assume that happens, the host puts a message into the ring buffer but does not interrupt. Subsequently, the user space code in the guest sets the inbound ring buffer interrupt mask to 0, saying “Hey, I’m ready for interrupts”... | 0% Низкий | 3 месяца назад | ||
BDU:2025-13624 Уязвимость модуля drivers/uio/uio_hv_generic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
SUSE-SU-2026:0029-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4506-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4515-1 Security update for the Linux Kernel | около 1 месяца назад | |||
ELSA-2025-28040 ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4521-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4505-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4422-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
ELSA-2025-28049 ELSA-2025-28049: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
SUSE-SU-2025:4516-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4393-1 Security update for the Linux Kernel | около 2 месяцев назад | |||
SUSE-SU-2025:4517-1 Security update for the Linux Kernel | около 1 месяца назад | |||
ELSA-2025-28048 ELSA-2025-28048: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
openSUSE-SU-2025:20091-1 Security update for the Linux Kernel | 2 месяца назад |
Уязвимостей на страницу