CVE-2024-46754

Updated: 2025-10-14 00:09:02.287304

Description:

In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops. The syzbot reported that the lwt_seg6 related BPF ops can be invoked via bpf_test_run() without without entering input_action_end_bpf() first. Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self test case but each BPF function expects it. Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2025-09-10 21:43:33 Deprioritize: this bug exists only in the eBPF self-test path (BPF_PROG_TEST_RUN) for the SRv6 LWT_S...
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-10-21 08:02:08 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-10-21 08:02:08 Ignored due to low severity
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2025:1763722365 2025-11-21 21:35:29 Ignored due to low severity
Oracle Linux 7 ELS kernel-uek 5.4.17 5.5 MEDIUM Ignored 2025-10-21 08:04:36 Ignored due to low severity