CVE-2024-26830
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
i40e: Do not allow untrusted VF to remove administratively set MAC<br />
<br />
Currently when PF administratively sets VF&#39;s MAC address and the VF<br />
is put down (VF tries to delete all MACs) then the MAC is removed<br />
from MAC filters and primary VF MAC is zeroed.<br />
<br />
Do not allow untrusted VF to remove primary MAC when it was set<br />
administratively by PF.<br />
<br />
Reproducer:<br />
1) Create VF<br />
2) Set VF interface up<br />
3) Administratively set the VF&#39;s MAC<br />
4) Put VF interface down<br />
<br />
[root@host ~]# echo 1 > /sys/class/net/enp2s0f0/device/sriov_numvfs<br />
[root@host ~]# ip link set enp2s0f0v0 up<br />
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d<br />
[root@host ~]# ip link show enp2s0f0<br />
23: enp2s0f0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000<br />
link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff<br />
vf 0 link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off<br />
[root@host ~]# ip link set enp2s0f0v0 down<br />
[root@host ~]# ip link show enp2s0f0<br />
23: enp2s0f0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000<br />
link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff<br />
vf 0 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
Impact
Base Score 3.x
6.30
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.14 (including) | 6.1.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.18 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.6 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
- https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
- https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
- https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d
- https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
- https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
- https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
- https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d