Lucene search

K
cveLinuxCVE-2024-46864
HistorySep 27, 2024 - 1:15 p.m.

CVE-2024-46864

2024-09-2713:15:17
Linux
web.nvd.nist.gov
4

AI Score

6.5

Confidence

High

In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b (“x86/hyperv: Fix hyperv_pcpu_input_arg handling when
CPUs go online/offline”) introduces a new cpuhp state for hyperv
initialization.

cpuhp_setup_state() returns the state number if state is
CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.
For the hyperv case, since a new cpuhp state was introduced it would
return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call
is conditioned upon “hyperv_init_cpuhp > 0”. This will never be true and
so hv_cpu_die() won’t be called on all CPUs. This means the VP assist page
won’t be reset. When the kexec kernel tries to setup the VP assist page
again, the hypervisor corrupts the memory region of the old VP assist page
causing a panic in case the kexec kernel is using that memory elsewhere.
This was originally fixed in commit dfe94d4086e4 (“x86/hyperv: Fix kexec
panic/hang issues”).

Get rid of hyperv_init_cpuhp entirely since we are no longer using a
dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with
cpuhp_remove_state().

Affected configurations

Vulners
Node
linuxlinux_kernelRange6.46.6.52
OR
linuxlinux_kernelRange6.7.06.10.11
OR
linuxlinux_kernelRange6.11.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/x86/hyperv/hv_init.c",
      "arch/x86/include/asm/mshyperv.h",
      "arch/x86/kernel/cpu/mshyperv.c"
    ],
    "versions": [
      {
        "version": "9636be85cc5b",
        "lessThan": "2ae1beb3ab4f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "9636be85cc5b",
        "lessThan": "d6f018a3b49d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "9636be85cc5b",
        "lessThan": "b9af6418279c",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/x86/hyperv/hv_init.c",
      "arch/x86/include/asm/mshyperv.h",
      "arch/x86/kernel/cpu/mshyperv.c"
    ],
    "versions": [
      {
        "version": "6.4",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "6.4",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.52",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.11",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.5

Confidence

High

Related for CVE-2024-46864