VYPR
Medium severity5.5NVD Advisory· Published Apr 17, 2024· Updated May 12, 2026

CVE-2024-26820

CVE-2024-26820

Description

In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed

If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER handler cannot perform VF register successfully as the register call is received before netvsc_probe is finished. This is because we register register_netdevice_notifier() very early( even before vmbus_driver_register()). To fix this, we try to register each such matching VF( if it is visible as a netdevice) at the end of netvsc_probe.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Linux kernel hv_netvsc driver may fail to register a VF after module reload, due to a race condition in the probe path.

Vulnerability

CVE-2024-26820 describes a race condition in the Linux kernel's hv_netvsc driver. The NET_DEVICE_REGISTER notifier is registered very early, even before vmbus_driver_register(). When the driver is unloaded and then reloaded, the notifier may receive a registration event before netvsc_probe() completes, causing VF (Virtual Function) registration to fail [1].

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

46

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.