CVE-2024-26723

7.8 HIGH

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's lan966x driver causes system crashes when adding network interfaces under a Link Aggregation Group (LAG). This affects systems using Microchip lan966x Ethernet controllers with bond/LAG configurations, potentially causing denial of service.

💻 Affected Systems

Products:
  • Linux kernel with lan966x driver
Versions: Linux kernel versions with vulnerable lan966x driver (specific versions not specified in CVE)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using lan966x network interfaces in bond/LAG configurations. Systems without lan966x hardware or not using bonding are not affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash/kernel panic leading to denial of service and potential data loss or corruption.

🟠

Likely Case

System crash when configuring network bonding/LAG interfaces, requiring reboot to restore functionality.

🟢

If Mitigated

No impact if systems don't use lan966x interfaces in bond/LAG configurations or have patched kernels.

🌐 Internet-Facing: LOW - Requires local network configuration access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Local administrators or network configuration tools could trigger the crash during normal operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to configure network interfaces. The crash occurs during legitimate configuration operations, not through malicious payloads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits: 15faa1f67ab4, 2a492f01228b, 48fae67d8374, b9357489c46c, 15faa1f67ab4

Vendor Advisory: https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check with your distribution for backported patches. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Avoid bond/LAG configuration with lan966x

linux

Do not configure lan966x interfaces under bond or LAG interfaces

# Do not run: ip link set dev eth0 master bond0
# Where eth0 is a lan966x interface

🧯 If You Can't Patch

  • Avoid configuring lan966x interfaces in bond/LAG groups
  • Implement change control procedures for network configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if system has lan966x interfaces: 'lspci | grep -i lan966x' or 'dmesg | grep lan966x'. If present and using bonding, system may be vulnerable.

Check Version:

uname -r

Verify Fix Applied:

Check kernel version includes fix commits: 'uname -r' and verify with distribution patch notes. Test bond configuration with lan966x interfaces.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • NULL pointer dereference in kernel logs
  • System crash during network configuration

Network Indicators:

  • Sudden loss of network connectivity on systems with lan966x bonding

SIEM Query:

source="kernel" AND ("NULL pointer" OR "lan966x" OR "kernel panic")

🔗 References

📤 Share & Export