In the Linux kernel, the following vulnerability has been resolved:
lan966x: Fix crash when adding interface under a lag There is a crash when
adding one of the lan966x interfaces under a lag interface. The issue can
be reproduced like this: ip link add name bond0 type bond miimon 100 mode
balance-xor ip link set dev eth0 master bond0 The reason is because when
adding a interface under the lag it would go through all the ports and try
to figure out which other ports are under that lag interface. And the issue
is that lan966x can have ports that are NULL pointer as they are not
probed. So then iterating over these ports it would just crash as they are
NULL pointers. The fix consists in actually checking for NULL pointers
before accessing something from the ports. Like we do in other places.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 23.10 | noarch | linux | < 6.5.0-44.44 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < 6.5.0-1023.23~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < 6.5.0-1024.25~22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-gcp | < 6.5.0-1024.26 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp-6.5 | < 6.5.0-1024.26~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-6.5 | < 6.5.0-44.44~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-lowlatency-hwe-6.5 | < 6.5.0-44.44.1~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-nvidia-6.5 | < 6.5.0-1023.24 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-oem-6.5 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-oracle-6.5 | < 6.5.0-1026.26~22.04.1 | UNKNOWN |
git.kernel.org/linus/15faa1f67ab405d47789d4702f587ec7df7ef03e (6.8-rc5)
git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e
git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1
git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c
git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672
launchpad.net/bugs/cve/CVE-2024-26723
nvd.nist.gov/vuln/detail/CVE-2024-26723
security-tracker.debian.org/tracker/CVE-2024-26723
ubuntu.com/security/notices/USN-6895-1
ubuntu.com/security/notices/USN-6895-2
ubuntu.com/security/notices/USN-6895-3
ubuntu.com/security/notices/USN-6900-1
www.cve.org/CVERecord?id=CVE-2024-26723