{"id":"CVE-2024-36006","summary":"mlxsw: spectrum_acl_tcam: Fix incorrect list API usage","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmlxsw: spectrum_acl_tcam: Fix incorrect list API usage\n\nBoth the function that migrates all the chunks within a region and the\nfunction that migrates all the entries within a chunk call\nlist_first_entry() on the respective lists without checking that the\nlists are not empty. This is incorrect usage of the API, which leads to\nthe following warning [1].\n\nFix by returning if the lists are empty as there is nothing to migrate\nin this case.\n\n[1]\nWARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0\u003e\nModules linked in:\nCPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39\nHardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019\nWorkqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work\nRIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0\n[...]\nCall Trace:\n \u003cTASK\u003e\n mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0\n process_one_work+0x151/0x370\n worker_thread+0x2cb/0x3e0\n kthread+0xd0/0x100\n ret_from_fork+0x34/0x50\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e","modified":"2026-04-02T11:59:59.274137Z","published":"2024-05-20T09:48:06.278Z","related":["ALSA-2024:5102","MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36006.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40"},{"type":"WEB","url":"https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36006.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36006"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6f9579d4e3021b17b0a4cde6b04a6c94c9575cdf"},{"fixed":"0b2c13b670b168e324e1cf109e67056a20fd610a"},{"fixed":"09846c2309b150b8ce4e0ce96f058197598fc530"},{"fixed":"64435b64e43d8ee60faa46c0cd04e323e8b2a7b0"},{"fixed":"4526a56e02da3725db979358964df9cd9c567154"},{"fixed":"ab4ecfb627338e440ae11def004c524a00d93e40"},{"fixed":"af8b593c3dd9df82cb199be65863af004b09fd97"},{"fixed":"b377add0f0117409c418ddd6504bd682ebe0bf79"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36006.json"}}],"schema_version":"1.7.5"}