CVE-2024-55916

Source
https://cve.org/CVERecord?id=CVE-2024-55916
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-55916.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-55916
Downstream
Related
Published
2025-01-11T12:35:44.800Z
Modified
2026-03-20T12:39:41.078507Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet
Details

In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet

If the KVP (or VSS) daemon starts before the VMBus channel's ringbuffer is fully initialized, we can hit the panic below:

hvutils: Registering HyperV Utility Driver hvvmbus: registering driver hvutils ... BUG: kernel NULL pointer dereference, address: 0000000000000000 CPU: 44 UID: 0 PID: 2552 Comm: hvkvpdaemon Tainted: G E 6.11.0-rc3+ #1 RIP: 0010:hvpktiterfirst+0x12/0xd0 Call Trace: ... vmbusrecvpacket hvkvponchannelcallback vmbusonevent taskletactioncommon taskletaction handlesoftirqs irqexitrcu sysvechypervstimer0 </IRQ> <TASK> asmsysvechypervstimer0 ... kvpregisterdone hvtopread vfsread ksysread __x64sysread

This can happen because the KVP/VSS channel callback can be invoked even before the channel is fully opened: 1) as soon as hvkvpinit() -> hvutiltransportinit() creates /dev/vmbus/hvkvp, the kvp daemon can open the device file immediately and register itself to the driver by writing a message KVPOPREGISTER1 to the file (which is handled by kvponmsg() ->kvphandlehandshake()) and reading the file for the driver's response, which is handled by hvtopread(), which calls hvt->onread(), i.e. kvpregisterdone().

2) the problem with kvpregisterdone() is that it can cause the channel callback to be called even before the channel is fully opened, and when the channel callback is starting to run, utilprobe()-> vmbusopen() may have not initialized the ringbuffer yet, so the callback can hit the panic of NULL pointer dereference.

To reproduce the panic consistently, we can add a "ssleep(10)" for KVP in __vmbusopen(), just before the first hvringbufferinit(), and then we unload and reload the driver hvutils, and run the daemon manually within the 10 seconds.

Fix the panic by reordering the steps in utilprobe() so the char dev entry used by the KVP or VSS daemon is not created until after vmbusopen() has completed. This reordering prevents the race condition from happening.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/55xxx/CVE-2024-55916.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e0fa3e5e7df61eb2c339c9f0067c202c0cdeec2c
Fixed
f091a224a2c82f1e302b1768d73bb6332f687321
Fixed
d81f4e73aff9b861671df60e5100ad25cc16fbf8
Fixed
042253c57be901bfd19f15b68267442b70f510d5
Fixed
718fe694a334be9d1a89eed22602369ac18d6583
Fixed
89fcec5e466b3ac9b376e0d621c71effa1a7983f
Fixed
3dd7a30c6d7f90afcf19e9b072f572ba524d7ec6
Fixed
07a756a49f4b4290b49ea46e089cbe6f79ff8d26

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-55916.json"