Linux kernel: IPv6 seg6 init invalid unregister path (CVE-2024-38612)
CVE-2024-38612 Published on June 19, 2024
ipv6: sr: fix invalid unregister error path
In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix invalid unregister error path
The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL
is not defined. In that case if seg6_hmac_init() fails, the
genl_unregister_family() isn't called.
This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control
lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible
use-after-free and null-ptr-deref") replaced unregister_pernet_subsys()
with genl_unregister_family() in this error path.
Vulnerability Analysis
CVE-2024-38612 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Types
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2024-38612 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2024-38612
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-38612 are published in these products:
Affected Versions
Linux:- Version 46738b1317e169b281ad74690276916e24d1be6d and below 10610575a3ac2a702bf5c57aa931beaf847949c7 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 646cd236c55e2cb5f146fc41bbe4034c4af5b2a4 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 00e6335329f23ac6cf3105931691674e28bc598c is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 1a63730fb315bb1bab97edd69ff58ad45e04bb01 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below e77a3ec7ada84543e75722a1283785a6544de925 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 3398a40dccb88d3a7eef378247a023a78472db66 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 85a70ff1e572160f1eeb096ed48d09a1c9d4d89a is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below c04d6a914e890ccea4a9d11233009a2ee7978bf4 is affected.
- Version 46738b1317e169b281ad74690276916e24d1be6d and below 160e9d2752181fcf18c662e74022d77d3164cd45 is affected.
- Version 4.10 is affected.
- Before 4.10 is unaffected.
- Version 4.19.316, <= 4.19.* is unaffected.
- Version 5.4.278, <= 5.4.* is unaffected.
- Version 5.10.219, <= 5.10.* is unaffected.
- Version 5.15.161, <= 5.15.* is unaffected.
- Version 6.1.93, <= 6.1.* is unaffected.
- Version 6.6.33, <= 6.6.* is unaffected.
- Version 6.8.12, <= 6.8.* is unaffected.
- Version 6.9.3, <= 6.9.* is unaffected.
- Version 6.10, <= * is unaffected.
- Version 46738b1317e1 and below 0610575a3ac is affected.
- Version 46738b1317e1 and below 646cd236c55e is affected.
- Version 46738b1317e1 and below 00e6335329f2 is affected.
- Version 46738b1317e1 and below 1a63730fb315 is affected.
- Version 46738b1317e1 and below e77a3ec7ada8 is affected.
- Version 46738b1317e1 and below 3398a40dccb8 is affected.
- Version 46738b1317e1 and below 85a70ff1e572 is affected.
- Version 46738b1317e1 and below c04d6a914e89 is affected.
- Version 46738b1317e1 and below 160e9d275218 is affected.
- Version 4.10 is affected.
- Before 4.10 is unaffected.
- Version 4.19.316, <= 4.20 is unaffected.
- Version 5.4.278, <= 5.5 is unaffected.
- Version 5.10.219, <= 5.11 is unaffected.
- Version 5.15.161, <= 5.16 is unaffected.
- Version 6.1.93, <= 6.2 is unaffected.
- Version 6.6.33, <= 6.7 is unaffected.
- Version 6.8.12, <= 6.9 is unaffected.
- Version 6.9.3, <= 6.10 is unaffected.
- Version 6.10-rc1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.