Advisory Published
CVE Published
Updated

CVE-2024-26830: i40e: Do not allow untrusted VF to remove administratively set MAC

First published: Wed Apr 17 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: i40e: Do not allow untrusted VF to remove administratively set MAC Currently when PF administratively sets VF's MAC address and the VF is put down (VF tries to delete all MACs) then the MAC is removed from MAC filters and primary VF MAC is zeroed. Do not allow untrusted VF to remove primary MAC when it was set administratively by PF. Reproducer: 1) Create VF 2) Set VF interface up 3) Administratively set the VF's MAC 4) Put VF interface down [root@host ~]# echo 1 > /sys/class/net/enp2s0f0/device/sriov_numvfs [root@host ~]# ip link set enp2s0f0v0 up [root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d [root@host ~]# ip link show enp2s0f0 23: enp2s0f0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff vf 0 link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off [root@host ~]# ip link set enp2s0f0v0 down [root@host ~]# ip link show enp2s0f0 23: enp2s0f0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff vf 0 link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<6.1.79
6.1.79
redhat/kernel<6.6.18
6.6.18
redhat/kernel<6.7.6
6.7.6
redhat/kernel<6.8
6.8
Linux Kernel>=3.14<6.1.79
Linux Kernel>=6.2<6.6.18
Linux Kernel>=6.7<6.7.6
Linux Kernel=6.8-rc1
Linux Kernel=6.8-rc2
Linux Kernel=6.8-rc3
Linux Kernel=6.8-rc4
debian/linux<=5.10.223-1<=5.10.234-1
6.1.129-1
6.1.128-1
6.12.21-1
6.12.22-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-26830?

    CVE-2024-26830 is considered a medium severity vulnerability due to its potential to allow untrusted virtual functions to remove administratively set MAC addresses.

  • How do I fix CVE-2024-26830?

    To mitigate CVE-2024-26830, update to the fixed kernel versions 6.1.79, 6.6.18, 6.7.6, 6.8 for Red Hat or ensure your Debian system uses versions 6.1.123-1, 6.1.119-1, 6.12.10-1, or 6.12.11-1.

  • What systems are affected by CVE-2024-26830?

    CVE-2024-26830 affects Linux kernel versions up to 6.1.79, 6.6.18, 6.7.6, 6.8 for Red Hat and versions up to 5.10.223-1 and 5.10.226-1 for Debian.

  • Is CVE-2024-26830 being actively exploited?

    As of now, there is no public indication that CVE-2024-26830 is being actively exploited in the wild.

  • What impact does CVE-2024-26830 have on system security?

    CVE-2024-26830 could lead to unauthorized MAC address changes, potentially impacting network security and traffic management.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203