CVE-2024-50296
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: hns3: fix kernel crash when uninstalling driver<br />
<br />
When the driver is uninstalled and the VF is disabled concurrently, a<br />
kernel crash occurs. The reason is that the two actions call function<br />
pci_disable_sriov(). The num_VFs is checked to determine whether to<br />
release the corresponding resources. During the second calling, num_VFs<br />
is not 0 and the resource release function is called. However, the<br />
corresponding resource has been released during the first invoking.<br />
Therefore, the problem occurs:<br />
<br />
[15277.839633][T50670] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020<br />
...<br />
[15278.131557][T50670] Call trace:<br />
[15278.134686][T50670] klist_put+0x28/0x12c<br />
[15278.138682][T50670] klist_del+0x14/0x20<br />
[15278.142592][T50670] device_del+0xbc/0x3c0<br />
[15278.146676][T50670] pci_remove_bus_device+0x84/0x120<br />
[15278.151714][T50670] pci_stop_and_remove_bus_device+0x6c/0x80<br />
[15278.157447][T50670] pci_iov_remove_virtfn+0xb4/0x12c<br />
[15278.162485][T50670] sriov_disable+0x50/0x11c<br />
[15278.166829][T50670] pci_disable_sriov+0x24/0x30<br />
[15278.171433][T50670] hnae3_unregister_ae_algo_prepare+0x60/0x90 [hnae3]<br />
[15278.178039][T50670] hclge_exit+0x28/0xd0 [hclge]<br />
[15278.182730][T50670] __se_sys_delete_module.isra.0+0x164/0x230<br />
[15278.188550][T50670] __arm64_sys_delete_module+0x1c/0x30<br />
[15278.193848][T50670] invoke_syscall+0x50/0x11c<br />
[15278.198278][T50670] el0_svc_common.constprop.0+0x158/0x164<br />
[15278.203837][T50670] do_el0_svc+0x34/0xcc<br />
[15278.207834][T50670] el0_svc+0x20/0x30<br />
<br />
For details, see the following figure.<br />
<br />
rmmod hclge disable VFs<br />
----------------------------------------------------<br />
hclge_exit() sriov_numvfs_store()<br />
... device_lock()<br />
pci_disable_sriov() hns3_pci_sriov_configure()<br />
pci_disable_sriov()<br />
sriov_disable()<br />
sriov_disable() if !num_VFs :<br />
if !num_VFs : return;<br />
return; sriov_del_vfs()<br />
sriov_del_vfs() ...<br />
... klist_put()<br />
klist_put() ...<br />
... num_VFs = 0;<br />
num_VFs = 0; device_unlock();<br />
<br />
In this patch, when driver is removing, we get the device_lock()<br />
to protect num_VFs, just like sriov_numvfs_store().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.214 (including) | 4.19.324 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.156 (including) | 5.4.286 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.76 (including) | 5.10.230 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14.15 (including) | 5.15 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 5.15.172 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.117 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/590a4b2d4e0b73586e88bce9b8135b593355ec09
- https://git.kernel.org/stable/c/719edd9f3372ce7fb3b157647c6658672946874b
- https://git.kernel.org/stable/c/76b155e14d9b182ce83d32ada2d0d7219ea8c8dd
- https://git.kernel.org/stable/c/7ae4e56de7dbd0999578246a536cf52a63f4056d
- https://git.kernel.org/stable/c/a0df055775f30850c0da8f7dab40d67c0fd63908
- https://git.kernel.org/stable/c/b5c94e4d947d15d521e935ff10c5a22a7883dea5
- https://git.kernel.org/stable/c/df3dff8ab6d79edc942464999d06fbaedf8cdd18
- https://git.kernel.org/stable/c/e36482b222e00cc7aeeea772fc0cf2943590bc4d
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



