![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26830 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
i40e: Do not allow untrusted VF to remove administratively set MAC
Currently when PF administratively sets VF's MAC address and the VF is
put down (VF tries to delete all MACs) then the MAC is removed from
MAC filters and primary VF MAC is zeroed. Do not allow untrusted VF to
remove primary MAC when it was set administratively by PF. Reproducer:
1) Create VF 2) Set VF interface up 3) Administratively set the VF's
MAC 4) Put VF interface down [root@host ~]# echo 1 >
/sys/class/net/enp2s0f0/device/sriov_numvfs [root@host ~]# ip link set
enp2s0f0v0 up [root@host ~]# ip link set enp2s0f0 vf 0 mac
fe:6c:b5:da:c7:7d [root@host ~]# ip link show enp2s0f0 23: enp2s0f0:
|
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26830 https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893 https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893 https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404 https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404 https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d |