CVE-2024-26723

In the Linux kernel, the following vulnerability has been resolved: lan966x: Fix crash when adding interface under a lag There is a crash when adding one of the lan966x interfaces under a lag interface. The issue can be reproduced like this: ip link add name bond0 type bond miimon 100 mode balance-xor ip link set dev eth0 master bond0 The reason is because when adding a interface under the lag it would go through all the ports and try to figure out which other ports are under that lag interface. And the issue is that lan966x can have ports that are NULL pointer as they are not probed. So then iterating over these ports it would just crash as they are NULL pointers. The fix consists in actually checking for NULL pointers before accessing something from the ports. Like we do in other places.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

History

04 Apr 2025, 15:04

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e - () https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e - Patch
References () https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1 - () https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1 - Patch
References () https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c - () https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c - Patch
References () https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672 - () https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672 - Patch

Information

Published : 2024-04-03 15:15

Updated : 2025-04-04 15:04


NVD link : CVE-2024-26723

Mitre link : CVE-2024-26723

CVE.ORG link : CVE-2024-26723


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-400

Uncontrolled Resource Consumption