Updated: 2025-10-14 00:09:02.287304
Description:
In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops. The syzbot reported that the lwt_seg6 related BPF ops can be invoked via bpf_test_run() without without entering input_action_end_bpf() first. Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self test case but each BPF function expects it. Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Ignored | 2025-09-10 21:43:33 | Deprioritize: this bug exists only in the eBPF self-test path (BPF_PROG_TEST_RUN) for the SRv6 LWT_S... | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2025-10-21 08:02:08 | Ignored due to low severity | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2025-10-21 08:02:08 | Ignored due to low severity | |
| CentOS Stream 8 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2025:1763722365 | 2025-11-21 21:35:29 | Ignored due to low severity |
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 5.5 | MEDIUM | Ignored | 2025-10-21 08:04:36 | Ignored due to low severity |