ghsa-vmpq-wpxg-r7rp
Vulnerability from github
Published
2024-02-22 18:30
Modified
2024-03-18 18:32
Details

In the Linux kernel, the following vulnerability has been resolved:

net: netdevsim: don't try to destroy PHC on VFs

PHC gets initialized in nsim_init_netdevsim(), which is only called if (nsim_dev_port_is_pf()).

Create a counterpart of nsim_init_netdevsim() and move the mock_phc_destroy() there.

This fixes a crash trying to destroy netdevsim with VFs instantiated, as caught by running the devlink.sh test:

BUG: kernel NULL pointer dereference, address: 00000000000000b8
RIP: 0010:mock_phc_destroy+0xd/0x30
Call Trace:
 <TASK>
 nsim_destroy+0x4a/0x70 [netdevsim]
 __nsim_dev_port_del+0x47/0x70 [netdevsim]
 nsim_dev_reload_destroy+0x105/0x120 [netdevsim]
 nsim_drv_remove+0x2f/0xb0 [netdevsim]
 device_release_driver_internal+0x1a1/0x210
 bus_remove_device+0xd5/0x120
 device_del+0x159/0x490
 device_unregister+0x12/0x30
 del_device_store+0x11a/0x1a0 [netdevsim]
 kernfs_fop_write_iter+0x130/0x1d0
 vfs_write+0x30b/0x4b0
 ksys_write+0x69/0xf0
 do_syscall_64+0xcc/0x1e0
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2024-26587"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-476"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-02-22T17:15:08Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: netdevsim: don\u0027t try to destroy PHC on VFs\n\nPHC gets initialized in nsim_init_netdevsim(), which\nis only called if (nsim_dev_port_is_pf()).\n\nCreate a counterpart of nsim_init_netdevsim() and\nmove the mock_phc_destroy() there.\n\nThis fixes a crash trying to destroy netdevsim with\nVFs instantiated, as caught by running the devlink.sh test:\n\n    BUG: kernel NULL pointer dereference, address: 00000000000000b8\n    RIP: 0010:mock_phc_destroy+0xd/0x30\n    Call Trace:\n     \u003cTASK\u003e\n     nsim_destroy+0x4a/0x70 [netdevsim]\n     __nsim_dev_port_del+0x47/0x70 [netdevsim]\n     nsim_dev_reload_destroy+0x105/0x120 [netdevsim]\n     nsim_drv_remove+0x2f/0xb0 [netdevsim]\n     device_release_driver_internal+0x1a1/0x210\n     bus_remove_device+0xd5/0x120\n     device_del+0x159/0x490\n     device_unregister+0x12/0x30\n     del_device_store+0x11a/0x1a0 [netdevsim]\n     kernfs_fop_write_iter+0x130/0x1d0\n     vfs_write+0x30b/0x4b0\n     ksys_write+0x69/0xf0\n     do_syscall_64+0xcc/0x1e0\n     entry_SYSCALL_64_after_hwframe+0x6f/0x77",
  "id": "GHSA-vmpq-wpxg-r7rp",
  "modified": "2024-03-18T18:32:17Z",
  "published": "2024-02-22T18:30:30Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26587"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/08aca65997fb6f233066883b1f1e653bcb1f26ca"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c5068e442eed063d2f1658e6b6d3c1c6fcf1e588"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/ea937f77208323d35ffe2f8d8fc81b00118bfcda"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.