cve-2024-26723
Vulnerability from cvelistv5
Published
2024-04-03 14:55
Modified
2025-05-04 08:54
Summary
In the Linux kernel, the following vulnerability has been resolved: lan966x: Fix crash when adding interface under a lag There is a crash when adding one of the lan966x interfaces under a lag interface. The issue can be reproduced like this: ip link add name bond0 type bond miimon 100 mode balance-xor ip link set dev eth0 master bond0 The reason is because when adding a interface under the lag it would go through all the ports and try to figure out which other ports are under that lag interface. And the issue is that lan966x can have ports that are NULL pointer as they are not probed. So then iterating over these ports it would just crash as they are NULL pointers. The fix consists in actually checking for NULL pointers before accessing something from the ports. Like we do in other places.
Impacted products
Vendor Product Version
Linux Linux Version: cabc9d49333df72fe0f6d58bdcf9057ba341e701
Version: cabc9d49333df72fe0f6d58bdcf9057ba341e701
Version: cabc9d49333df72fe0f6d58bdcf9057ba341e701
Version: cabc9d49333df72fe0f6d58bdcf9057ba341e701
Create a notification for this product.
   Linux Linux Version: 6.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "linux_kernel",
                  vendor: "linux",
                  versions: [
                     {
                        lessThan: "b9357489c46c",
                        status: "affected",
                        version: "cabc9d49333d",
                        versionType: "custom",
                     },
                     {
                        lessThan: "48fae67d8374",
                        status: "affected",
                        version: "cabc9d49333d",
                        versionType: "custom",
                     },
                     {
                        lessThan: "2a492f01228b",
                        status: "affected",
                        version: "cabc9d49333d",
                        versionType: "custom",
                     },
                     {
                        lessThan: "15faa1f67ab4",
                        status: "affected",
                        version: "cabc9d49333d",
                        versionType: "custom",
                     },
                     {
                        status: "affected",
                        version: "6.1",
                     },
                     {
                        lessThan: "6.1",
                        status: "unaffected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "6.2",
                        status: "unaffected",
                        version: "6.1.79",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "6.7",
                        status: "unaffected",
                        version: "6.6.18",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "6.8",
                        status: "unaffected",
                        version: "6.76",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "6.8",
                        status: "unaffected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-26723",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-07-16T14:40:24.360692Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-400",
                        description: "CWE-400 Uncontrolled Resource Consumption",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-07-16T14:53:54.712Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T00:14:13.203Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/net/ethernet/microchip/lan966x/lan966x_lag.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "b9357489c46c7a43999964628db8b47d3a1f8672",
                     status: "affected",
                     version: "cabc9d49333df72fe0f6d58bdcf9057ba341e701",
                     versionType: "git",
                  },
                  {
                     lessThan: "48fae67d837488c87379f0c9f27df7391718477c",
                     status: "affected",
                     version: "cabc9d49333df72fe0f6d58bdcf9057ba341e701",
                     versionType: "git",
                  },
                  {
                     lessThan: "2a492f01228b7d091dfe38974ef40dccf8f9f2f1",
                     status: "affected",
                     version: "cabc9d49333df72fe0f6d58bdcf9057ba341e701",
                     versionType: "git",
                  },
                  {
                     lessThan: "15faa1f67ab405d47789d4702f587ec7df7ef03e",
                     status: "affected",
                     version: "cabc9d49333df72fe0f6d58bdcf9057ba341e701",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/net/ethernet/microchip/lan966x/lan966x_lag.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.1",
                  },
                  {
                     lessThan: "6.1",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.79",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.18",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.*",
                     status: "unaffected",
                     version: "6.7.6",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.8",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         cpeApplicability: [
            {
               nodes: [
                  {
                     cpeMatch: [
                        {
                           criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.1.79",
                           versionStartIncluding: "6.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.6.18",
                           versionStartIncluding: "6.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.7.6",
                           versionStartIncluding: "6.1",
                           vulnerable: true,
                        },
                        {
                           criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                           versionEndExcluding: "6.8",
                           versionStartIncluding: "6.1",
                           vulnerable: true,
                        },
                     ],
                     negate: false,
                     operator: "OR",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nlan966x: Fix crash when adding interface under a lag\n\nThere is a crash when adding one of the lan966x interfaces under a lag\ninterface. The issue can be reproduced like this:\nip link add name bond0 type bond miimon 100 mode balance-xor\nip link set dev eth0 master bond0\n\nThe reason is because when adding a interface under the lag it would go\nthrough all the ports and try to figure out which other ports are under\nthat lag interface. And the issue is that lan966x can have ports that are\nNULL pointer as they are not probed. So then iterating over these ports\nit would just crash as they are NULL pointers.\nThe fix consists in actually checking for NULL pointers before accessing\nsomething from the ports. Like we do in other places.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-05-04T08:54:55.658Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672",
            },
            {
               url: "https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c",
            },
            {
               url: "https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1",
            },
            {
               url: "https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e",
            },
         ],
         title: "lan966x: Fix crash when adding interface under a lag",
         x_generator: {
            engine: "bippy-1.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-26723",
      datePublished: "2024-04-03T14:55:22.529Z",
      dateReserved: "2024-02-19T14:20:24.163Z",
      dateUpdated: "2025-05-04T08:54:55.658Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-26723\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-04-03T15:15:54.143\",\"lastModified\":\"2025-04-04T15:04:57.577\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlan966x: Fix crash when adding interface under a lag\\n\\nThere is a crash when adding one of the lan966x interfaces under a lag\\ninterface. The issue can be reproduced like this:\\nip link add name bond0 type bond miimon 100 mode balance-xor\\nip link set dev eth0 master bond0\\n\\nThe reason is because when adding a interface under the lag it would go\\nthrough all the ports and try to figure out which other ports are under\\nthat lag interface. And the issue is that lan966x can have ports that are\\nNULL pointer as they are not probed. So then iterating over these ports\\nit would just crash as they are NULL pointers.\\nThe fix consists in actually checking for NULL pointers before accessing\\nsomething from the ports. Like we do in other places.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvió la siguiente vulnerabilidad: lan966x: se solucionó el bloqueo al agregar una interfaz con un retraso. Se produce un bloqueo al agregar una de las interfaces lan966x con un retraso. El problema se puede reproducir así: enlace ip agregar nombre bond0 tipo bond miimon modo 100 balance-xor enlace ip establecer dev eth0 master bond0 La razón es que al agregar una interfaz bajo el retraso pasaría por todos los puertos e intentaría calcular determine qué otros puertos están bajo esa interfaz de retraso. Y el problema es que lan966x puede tener puertos que sean punteros NULL ya que no están sondeados. Entonces, al iterar sobre estos puertos, simplemente fallaría porque son punteros NULL. La solución consiste en comprobar si hay punteros NULL antes de acceder a algo desde los puertos. Como hacemos en otros lugares.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndExcluding\":\"6.1.79\",\"matchCriteriaId\":\"6C98214F-2BB3-4FAF-A9B6-CEFB3F97E58B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.18\",\"matchCriteriaId\":\"BD961E49-FEDA-47CF-BF23-4D2BD942B4E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.7.6\",\"matchCriteriaId\":\"C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F4EA73-0894-400F-A490-3A397AB7A517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"056BD938-0A27-4569-B391-30578B309EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02056A5-B362-4370-9FF8-6F0BD384D520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"62075ACE-B2A0-4B16-829D-B3DA5AE5CC41\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T00:14:13.203Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-26723\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-16T14:40:24.360692Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\"], \"vendor\": \"linux\", \"product\": \"linux_kernel\", \"versions\": [{\"status\": \"affected\", \"version\": \"cabc9d49333d\", \"lessThan\": \"b9357489c46c\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333d\", \"lessThan\": \"48fae67d8374\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333d\", \"lessThan\": \"2a492f01228b\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333d\", \"lessThan\": \"15faa1f67ab4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"6.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.1\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"6.1.79\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2\"}, {\"status\": \"unaffected\", \"version\": \"6.6.18\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.7\"}, {\"status\": \"unaffected\", \"version\": \"6.76\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.8\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-16T14:45:31.412Z\"}}], \"cna\": {\"title\": \"lan966x: Fix crash when adding interface under a lag\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"cabc9d49333df72fe0f6d58bdcf9057ba341e701\", \"lessThan\": \"b9357489c46c7a43999964628db8b47d3a1f8672\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333df72fe0f6d58bdcf9057ba341e701\", \"lessThan\": \"48fae67d837488c87379f0c9f27df7391718477c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333df72fe0f6d58bdcf9057ba341e701\", \"lessThan\": \"2a492f01228b7d091dfe38974ef40dccf8f9f2f1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"cabc9d49333df72fe0f6d58bdcf9057ba341e701\", \"lessThan\": \"15faa1f67ab405d47789d4702f587ec7df7ef03e\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/ethernet/microchip/lan966x/lan966x_lag.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.1\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.79\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.18\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.7.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.7.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/ethernet/microchip/lan966x/lan966x_lag.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672\"}, {\"url\": \"https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c\"}, {\"url\": \"https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1\"}, {\"url\": \"https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nlan966x: Fix crash when adding interface under a lag\\n\\nThere is a crash when adding one of the lan966x interfaces under a lag\\ninterface. The issue can be reproduced like this:\\nip link add name bond0 type bond miimon 100 mode balance-xor\\nip link set dev eth0 master bond0\\n\\nThe reason is because when adding a interface under the lag it would go\\nthrough all the ports and try to figure out which other ports are under\\nthat lag interface. And the issue is that lan966x can have ports that are\\nNULL pointer as they are not probed. So then iterating over these ports\\nit would just crash as they are NULL pointers.\\nThe fix consists in actually checking for NULL pointers before accessing\\nsomething from the ports. Like we do in other places.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.79\", \"versionStartIncluding\": \"6.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.18\", \"versionStartIncluding\": \"6.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.7.6\", \"versionStartIncluding\": \"6.1\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8\", \"versionStartIncluding\": \"6.1\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T08:54:55.658Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-26723\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T08:54:55.658Z\", \"dateReserved\": \"2024-02-19T14:20:24.163Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-04-03T14:55:22.529Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.