CVE-2024-26820

In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER handler cannot perform VF register successfully as the register call is received before netvsc_probe is finished. This is because we register register_netdevice_notifier() very early( even before vmbus_driver_register()). To fix this, we try to register each such matching VF( if it is visible as a netdevice) at the end of netvsc_probe.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

27 Mar 2025, 21:08

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
Debian debian Linux
Debian
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef - () https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef - Patch
References () https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135 - () https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135 - Patch
References () https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7 - () https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7 - Patch
References () https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2 - () https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2 - Patch
References () https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418 - () https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418 - Patch
References () https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c - () https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c - Patch
References () https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d - () https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d - Patch
References () https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366 - () https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef - () https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef -
References () https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135 - () https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135 -
References () https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7 - () https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7 -
References () https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2 - () https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2 -
References () https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418 - () https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418 -
References () https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c - () https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c -
References () https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d - () https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d -
References () https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366 - () https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: hv_netvsc: registre VF en netvsc_probe si se perdió NET_DEVICE_REGISTER. Si el controlador hv_netvsc se descarga y se vuelve a cargar, el controlador NET_DEVICE_REGISTER no puede realizar el registro VF exitosamente ya que la llamada de registro se recibe antes de que finalice netvsc_probe. Esto se debe a que registramos Register_netdevice_notifier() muy temprano (incluso antes de vmbus_driver_register()). Para solucionar este problema, intentamos registrar cada VF coincidente (si es visible como un dispositivo de red) al final de netvsc_probe.

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-03-27 21:08


NVD link : CVE-2024-26820

Mitre link : CVE-2024-26820

CVE.ORG link : CVE-2024-26820


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux