CVE-2024-42134

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-42134
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42134.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-42134
Downstream
Related
Published
2024-07-30T07:46:29Z
Modified
2025-10-14T19:57:22.341352Z
Summary
virtio-pci: Check if is_avq is NULL
Details

In the Linux kernel, the following vulnerability has been resolved:

virtio-pci: Check if is_avq is NULL

[bug] In the virtiopcicommon.c function vpdelvqs, vpdev->isavq is involved to determine whether it is admin virtqueue, but this function vpdev->isavq may be empty. For installations, virtiopcilegacy does not assign a value to vpdev->isavq.

[fix] Check whether it is vpdev->isavq before use.

[test] Test with virsh Attach device Before this patch, the following command would crash the guest system

After applying the patch, everything seems to be working fine.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd27ef6b44bec26915c5b2b22c13856d9f0ba17a
Fixed
5e2024b0b9b3d5709e3f7e9b92951d7e29154106
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fd27ef6b44bec26915c5b2b22c13856d9f0ba17a
Fixed
c8fae27d141a32a1624d0d0d5419d94252824498

Affected versions

v6.*

v6.7
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7
v6.9.1
v6.9.2
v6.9.3
v6.9.4
v6.9.5
v6.9.6
v6.9.7
v6.9.8

Database specific

{
    "vanir_signatures": [
        {
            "signature_type": "Line",
            "target": {
                "file": "drivers/virtio/virtio_pci_common.c"
            },
            "id": "CVE-2024-42134-3a73d061",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "67343116263677947218167498666602843052",
                    "134232337452913613846466633606534041230",
                    "176093580211439452934423332340911036164",
                    "187161643584660451291541079057742562510"
                ]
            },
            "deprecated": false,
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8fae27d141a32a1624d0d0d5419d94252824498",
            "signature_version": "v1"
        },
        {
            "signature_type": "Function",
            "target": {
                "file": "drivers/virtio/virtio_pci_common.c",
                "function": "vp_del_vqs"
            },
            "id": "CVE-2024-42134-57059f84",
            "digest": {
                "length": 1244.0,
                "function_hash": "237045376197584699720474165698568172027"
            },
            "deprecated": false,
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c8fae27d141a32a1624d0d0d5419d94252824498",
            "signature_version": "v1"
        },
        {
            "signature_type": "Line",
            "target": {
                "file": "drivers/virtio/virtio_pci_common.c"
            },
            "id": "CVE-2024-42134-a96be4ca",
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "67343116263677947218167498666602843052",
                    "134232337452913613846466633606534041230",
                    "176093580211439452934423332340911036164",
                    "187161643584660451291541079057742562510"
                ]
            },
            "deprecated": false,
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e2024b0b9b3d5709e3f7e9b92951d7e29154106",
            "signature_version": "v1"
        },
        {
            "signature_type": "Function",
            "target": {
                "file": "drivers/virtio/virtio_pci_common.c",
                "function": "vp_del_vqs"
            },
            "id": "CVE-2024-42134-f88b87cf",
            "digest": {
                "length": 1244.0,
                "function_hash": "237045376197584699720474165698568172027"
            },
            "deprecated": false,
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5e2024b0b9b3d5709e3f7e9b92951d7e29154106",
            "signature_version": "v1"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.9.9