CVE-2024-46754
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/09/2024
Last modified:
08/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Remove tst_run from lwt_seg6local_prog_ops.<br />
<br />
The syzbot reported that the lwt_seg6 related BPF ops can be invoked<br />
via bpf_test_run() without without entering input_action_end_bpf()<br />
first.<br />
<br />
Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL<br />
probably didn&#39;t work since it was introduced in commit 04d4b274e2a<br />
("ipv6: sr: Add seg6local action End.BPF"). The reason is that the<br />
per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self<br />
test case but each BPF function expects it.<br />
<br />
Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.18 (including) | 6.10.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



