In the Linux kernel, the following vulnerability has been resolved:
mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
Both the function that migrates all the chunks within a region and the
function that migrates all the entries within a chunk call
list_first_entry() on the respective lists without checking that the
lists are not empty. This is incorrect usage of the API, which leads to
the following warning [1].
Fix by returning if the lists are empty as there is nothing to migrate
in this case.
[1]
WARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0>
Modules linked in:
CPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0
[...]
Call Trace:
<TASK>
mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0
process_one_work+0x151/0x370
worker_thread+0x2cb/0x3e0
kthread+0xd0/0x100
ret_from_fork+0x34/0x50
ret_from_fork_asm+0x1a/0x30
</TASK>
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 03:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530 - Patch | |
| References | () https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a - Patch | |
| References | () https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154 - Patch | |
| References | () https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0 - Patch | |
| References | () https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40 - Patch | |
| References | () https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97 - Patch | |
| References | () https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530 - | |
| References | () https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a - | |
| References | () https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154 - | |
| References | () https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0 - | |
| References | () https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40 - | |
| References | () https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97 - | |
| References | () https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79 - |
05 Nov 2024, 10:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
20 May 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-20 10:15
Updated : 2025-12-17 03:33
NVD link : CVE-2024-36006
Mitre link : CVE-2024-36006
CVE.ORG link : CVE-2024-36006
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
