CVE-2024-46864 (GCVE-0-2024-46864)

Vulnerability from cvelistv5 – Published: 2024-09-27 12:42 – Updated: 2025-05-04 09:36
VLAI?
Title
x86/hyperv: fix kexec crash due to VP assist page corruption
Summary
In the Linux kernel, the following vulnerability has been resolved: x86/hyperv: fix kexec crash due to VP assist page corruption commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline") introduces a new cpuhp state for hyperv initialization. cpuhp_setup_state() returns the state number if state is CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states. For the hyperv case, since a new cpuhp state was introduced it would return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call is conditioned upon "hyperv_init_cpuhp > 0". This will never be true and so hv_cpu_die() won't be called on all CPUs. This means the VP assist page won't be reset. When the kexec kernel tries to setup the VP assist page again, the hypervisor corrupts the memory region of the old VP assist page causing a panic in case the kexec kernel is using that memory elsewhere. This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec panic/hang issues"). Get rid of hyperv_init_cpuhp entirely since we are no longer using a dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with cpuhp_remove_state().
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 9636be85cc5bdd8b7a7f6a53405cbcc52161c93c , < 2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825 (git)
Affected: 9636be85cc5bdd8b7a7f6a53405cbcc52161c93c , < d6f018a3b49d0a94ddbd0e479c2af6b19724e434 (git)
Affected: 9636be85cc5bdd8b7a7f6a53405cbcc52161c93c , < b9af6418279c4cf73ca073f8ea024992b38be8ab (git)
Create a notification for this product.
    Linux Linux Affected: 6.4
Unaffected: 0 , < 6.4 (semver)
Unaffected: 6.6.52 , ≤ 6.6.* (semver)
Unaffected: 6.10.11 , ≤ 6.10.* (semver)
Unaffected: 6.11 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-46864",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-29T13:43:47.814007Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-29T13:45:38.100Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "arch/x86/hyperv/hv_init.c",
            "arch/x86/include/asm/mshyperv.h",
            "arch/x86/kernel/cpu/mshyperv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825",
              "status": "affected",
              "version": "9636be85cc5bdd8b7a7f6a53405cbcc52161c93c",
              "versionType": "git"
            },
            {
              "lessThan": "d6f018a3b49d0a94ddbd0e479c2af6b19724e434",
              "status": "affected",
              "version": "9636be85cc5bdd8b7a7f6a53405cbcc52161c93c",
              "versionType": "git"
            },
            {
              "lessThan": "b9af6418279c4cf73ca073f8ea024992b38be8ab",
              "status": "affected",
              "version": "9636be85cc5bdd8b7a7f6a53405cbcc52161c93c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "arch/x86/hyperv/hv_init.c",
            "arch/x86/include/asm/mshyperv.h",
            "arch/x86/kernel/cpu/mshyperv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.4"
            },
            {
              "lessThan": "6.4",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.52",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.52",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.11",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11",
                  "versionStartIncluding": "6.4",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/hyperv: fix kexec crash due to VP assist page corruption\n\ncommit 9636be85cc5b (\"x86/hyperv: Fix hyperv_pcpu_input_arg handling when\nCPUs go online/offline\") introduces a new cpuhp state for hyperv\ninitialization.\n\ncpuhp_setup_state() returns the state number if state is\nCPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.\nFor the hyperv case, since a new cpuhp state was introduced it would\nreturn 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call\nis conditioned upon \"hyperv_init_cpuhp \u003e 0\". This will never be true and\nso hv_cpu_die() won\u0027t be called on all CPUs. This means the VP assist page\nwon\u0027t be reset. When the kexec kernel tries to setup the VP assist page\nagain, the hypervisor corrupts the memory region of the old VP assist page\ncausing a panic in case the kexec kernel is using that memory elsewhere.\nThis was originally fixed in commit dfe94d4086e4 (\"x86/hyperv: Fix kexec\npanic/hang issues\").\n\nGet rid of hyperv_init_cpuhp entirely since we are no longer using a\ndynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with\ncpuhp_remove_state()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:36:14.991Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825"
        },
        {
          "url": "https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434"
        },
        {
          "url": "https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab"
        }
      ],
      "title": "x86/hyperv: fix kexec crash due to VP assist page corruption",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-46864",
    "datePublished": "2024-09-27T12:42:52.994Z",
    "dateReserved": "2024-09-11T15:12:18.294Z",
    "dateUpdated": "2025-05-04T09:36:14.991Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46864\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T13:43:47.814007Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T13:45:35.267Z\"}}], \"cna\": {\"title\": \"x86/hyperv: fix kexec crash due to VP assist page corruption\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"9636be85cc5bdd8b7a7f6a53405cbcc52161c93c\", \"lessThan\": \"2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"9636be85cc5bdd8b7a7f6a53405cbcc52161c93c\", \"lessThan\": \"d6f018a3b49d0a94ddbd0e479c2af6b19724e434\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"9636be85cc5bdd8b7a7f6a53405cbcc52161c93c\", \"lessThan\": \"b9af6418279c4cf73ca073f8ea024992b38be8ab\", \"versionType\": \"git\"}], \"programFiles\": [\"arch/x86/hyperv/hv_init.c\", \"arch/x86/include/asm/mshyperv.h\", \"arch/x86/kernel/cpu/mshyperv.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.52\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.11\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"arch/x86/hyperv/hv_init.c\", \"arch/x86/include/asm/mshyperv.h\", \"arch/x86/kernel/cpu/mshyperv.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825\"}, {\"url\": \"https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434\"}, {\"url\": \"https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nx86/hyperv: fix kexec crash due to VP assist page corruption\\n\\ncommit 9636be85cc5b (\\\"x86/hyperv: Fix hyperv_pcpu_input_arg handling when\\nCPUs go online/offline\\\") introduces a new cpuhp state for hyperv\\ninitialization.\\n\\ncpuhp_setup_state() returns the state number if state is\\nCPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.\\nFor the hyperv case, since a new cpuhp state was introduced it would\\nreturn 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call\\nis conditioned upon \\\"hyperv_init_cpuhp \u003e 0\\\". This will never be true and\\nso hv_cpu_die() won\u0027t be called on all CPUs. This means the VP assist page\\nwon\u0027t be reset. When the kexec kernel tries to setup the VP assist page\\nagain, the hypervisor corrupts the memory region of the old VP assist page\\ncausing a panic in case the kexec kernel is using that memory elsewhere.\\nThis was originally fixed in commit dfe94d4086e4 (\\\"x86/hyperv: Fix kexec\\npanic/hang issues\\\").\\n\\nGet rid of hyperv_init_cpuhp entirely since we are no longer using a\\ndynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with\\ncpuhp_remove_state().\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.52\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.11\", \"versionStartIncluding\": \"6.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.11\", \"versionStartIncluding\": \"6.4\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:36:14.991Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-46864\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:36:14.991Z\", \"dateReserved\": \"2024-09-11T15:12:18.294Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-27T12:42:52.994Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…