In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix invalid unregister error path
The error path of seg6init() is wrong in case CONFIGIPV6SEG6LWTUNNEL is not defined. In that case if seg6hmacinit() fails, the genlunregisterfamily() isn't called.
This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible use-after-free and null-ptr-deref") replaced unregisterpernetsubsys() with genlunregisterfamily() in this error path.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 823.0,
"function_hash": "265740956886182986954836745367378751594"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00e6335329f23ac6cf3105931691674e28bc598c",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-066442e9"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a63730fb315bb1bab97edd69ff58ad45e04bb01",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-0c314052"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 823.0,
"function_hash": "265740956886182986954836745367378751594"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@85a70ff1e572160f1eeb096ed48d09a1c9d4d89a",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-17b2a626"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@646cd236c55e2cb5f146fc41bbe4034c4af5b2a4",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-7324ba0e"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 823.0,
"function_hash": "265740956886182986954836745367378751594"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3398a40dccb88d3a7eef378247a023a78472db66",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-84551459"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 823.0,
"function_hash": "265740956886182986954836745367378751594"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1a63730fb315bb1bab97edd69ff58ad45e04bb01",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-9888bd43"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@00e6335329f23ac6cf3105931691674e28bc598c",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-a4a0220e"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 834.0,
"function_hash": "314137156467175667246654261302298712013"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10610575a3ac2a702bf5c57aa931beaf847949c7",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-c1043c1b"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@85a70ff1e572160f1eeb096ed48d09a1c9d4d89a",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-cc28dc8f"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10610575a3ac2a702bf5c57aa931beaf847949c7",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-e1c75a53"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 834.0,
"function_hash": "314137156467175667246654261302298712013"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@646cd236c55e2cb5f146fc41bbe4034c4af5b2a4",
"target": {
"file": "net/ipv6/seg6.c",
"function": "seg6_init"
},
"id": "CVE-2024-38612-e5979bd5"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"87682271486846429133656477153238679821",
"83917754182681734896809554812229555090",
"337461780740187170101148793547589623389",
"199497559659929721065066707248799535369"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3398a40dccb88d3a7eef378247a023a78472db66",
"target": {
"file": "net/ipv6/seg6.c"
},
"id": "CVE-2024-38612-edd96b8f"
}
]