PatchSiren cyber security CVE debrief
CVE-2024-26820 Linux CVE debrief
CVE-2024-26820 affects the Linux kernel’s hv_netvsc driver and can cause virtual function registration to be missed when the driver is unloaded and reloaded. The result is a networking disruption issue rather than a confidentiality or integrity flaw. NVD rates it as a medium-severity local problem with high availability impact.
- Vendor
- Linux
- Product
- CVE-2024-26820
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-04-17
- Original CVE updated
- 2026-05-12
- Advisory published
- 2024-04-17
- Advisory updated
- 2026-05-12
Who should care
Kernel maintainers, Linux distribution security teams, and operators of Linux guests using Hyper-V/hv_netvsc networking should care most, especially if they run kernels in the affected version ranges or rely on driver unload/reload workflows.
Technical summary
The issue stems from notifier timing in hv_netvsc: register_netdevice_notifier() is registered very early, before vmbus_driver_register(), so a NET_DEVICE_REGISTER event for a matching VF can arrive before netvsc_probe finishes. In that case, VF registration may be missed. The fix is to attempt registration for each matching VF that is visible as a netdevice at the end of netvsc_probe, closing the race/window where the registration event was lost.
Defensive priority
Medium. NVD assigns CVSS 5.5 (AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H), indicating a local issue with significant availability impact but no direct confidentiality or integrity impact. It is not marked as a Known Exploited Vulnerability in the supplied corpus.
Recommended defensive actions
- Update to a kernel release or vendor backport that includes the hv_netvsc fix.
- Check your distribution’s security advisories for the matching stable-backport commit that applies to your kernel stream.
- Prioritize remediation on Linux systems running as Hyper-V guests where hv_netvsc is used and driver reloads are possible.
- After patching, validate that VF registration and network interface behavior remain correct across driver unload/reload cycles.
Evidence notes
The supplied NVD record describes the failure mode and lists affected Linux kernel ranges, including 4.19.301-4.19.309, 5.4.263-5.4.271, 5.10.203-5.10.212, 5.15.141-5.15.151, 6.1.65-6.1.78, 6.6.4-6.6.17, and 6.7-6.7.5, plus 6.8 rc builds. NVD lists CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and CWE as NVD-CWE-noinfo. Multiple official kernel stable patch links are cited in the source corpus.
Official resources
-
CVE-2024-26820 CVE record
CVE.org
-
CVE-2024-26820 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
CVE published on 2024-04-17T10:15:08.867Z and later modified on 2026-05-12T12:16:20.677Z in the supplied NVD source. This debrief uses the CVE publication date for timeline context.