CVE-2024-39489

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it's going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jul 2024, 14:50

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0e44d6cbe8de983470c3d2f978649783384fdcb6 - () https://git.kernel.org/stable/c/0e44d6cbe8de983470c3d2f978649783384fdcb6 - Patch
References () https://git.kernel.org/stable/c/4a3fcf53725b70010d1cf869a2ba549fed6b8fb3 - () https://git.kernel.org/stable/c/4a3fcf53725b70010d1cf869a2ba549fed6b8fb3 - Patch
References () https://git.kernel.org/stable/c/599a5654215092ac22bfc453f4fd3959c55ea821 - () https://git.kernel.org/stable/c/599a5654215092ac22bfc453f4fd3959c55ea821 - Patch
References () https://git.kernel.org/stable/c/61d31ac85b4572d11f8071855c0ccb4f32d76c0c - () https://git.kernel.org/stable/c/61d31ac85b4572d11f8071855c0ccb4f32d76c0c - Patch
References () https://git.kernel.org/stable/c/afd5730969aec960a2fee4e5ee839a6014643976 - () https://git.kernel.org/stable/c/afd5730969aec960a2fee4e5ee839a6014643976 - Patch
References () https://git.kernel.org/stable/c/daf341e0a2318b813427d5a78788c86f4a7f02be - () https://git.kernel.org/stable/c/daf341e0a2318b813427d5a78788c86f4a7f02be - Patch
References () https://git.kernel.org/stable/c/efb9f4f19f8e37fde43dfecebc80292d179f56c6 - () https://git.kernel.org/stable/c/efb9f4f19f8e37fde43dfecebc80292d179f56c6 - Patch
References () https://git.kernel.org/stable/c/f6a99ef4e056c20a138a95cc51332b2b96c8f383 - () https://git.kernel.org/stable/c/f6a99ef4e056c20a138a95cc51332b2b96c8f383 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

11 Jul 2024, 13:05

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ipv6: sr: corrige memleak en seg6_hmac_init_algo seg6_hmac_init_algo regresa sin limpiar las asignaciones anteriores si una falla, por lo que perderá toda esa memoria y los tfms criptográficos. Actualice seg6_hmac_exit para liberar solo la memoria cuando esté asignada, de modo que podamos reutilizar el código directamente.

10 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-10 08:15

Updated : 2024-07-31 14:50


NVD link : CVE-2024-39489

Mitre link : CVE-2024-39489

CVE.ORG link : CVE-2024-39489


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime