CVE-2024-39490: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix missing sk_buff release in seg6_input_core The seg6_input() function is responsible for adding the SRH into a packet, delegating the operation to the seg6_input_core(). This function uses the skb_cow_head() to ensure that there is sufficient headroom in the sk_buff for accommodating the link-layer header. In the event that the skb_cow_header() function fails, the seg6_input_core() catches the error but it does not release the sk_buff, which will result in a memory leak. This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due to headroom too small after SRH push") and persists even after commit 7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"), where the entire seg6_input() code was refactored to deal with netfilter hooks. The proposed patch addresses the identified memory leak by requiring the seg6_input_core() function to release the sk_buff in the event that skb_cow_head() fails.
AI Analysis
Technical Summary
CVE-2024-39490 is a medium severity vulnerability in the Linux kernel's IPv6 Segment Routing (SRv6) implementation, specifically within the seg6_input_core() function. The vulnerability arises from a memory leak caused by improper handling of sk_buff (socket buffer) objects when skb_cow_head() fails. The seg6_input() function, which processes IPv6 packets with Segment Routing Headers (SRH), delegates to seg6_input_core() to ensure sufficient headroom in the sk_buff for link-layer headers. If skb_cow_head() fails to allocate or copy the buffer headroom, seg6_input_core() catches the error but neglects to release the sk_buff, resulting in a memory leak (classified as CWE-401: Improper Release of Memory Before Removing Last Reference). This flaw was introduced in commit af3b5158b89d and persisted through subsequent refactoring, including commit 7a3f5b0de364 that added netfilter hooks to the SRv6 data plane. The patch requires seg6_input_core() to properly release the sk_buff upon failure of skb_cow_head(), preventing the leak. The vulnerability does not require privileges or user interaction to exploit and has a CVSS 3.1 score of 6.2, indicating a medium severity. The impact is limited to confidentiality loss, as indicated by the CVSS vector (C:H/I:N/A:N), suggesting potential information disclosure through memory exhaustion or side effects of the leak, but no integrity or availability impact is noted. No known exploits are currently in the wild.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with affected versions that handle IPv6 traffic using Segment Routing. The memory leak could lead to gradual resource exhaustion on network devices or servers processing SRv6 packets, potentially causing degraded performance or denial of service if memory consumption grows unchecked. While the CVSS indicates no direct availability impact, in high-throughput or critical network environments, such leaks can indirectly affect service reliability. Confidentiality impact suggests that sensitive data might be exposed if memory is improperly managed, although the exact leakage vector is not detailed. Organizations relying on Linux-based routers, firewalls, or servers with IPv6 SRv6 enabled should be particularly vigilant. Given the increasing adoption of IPv6 and SRv6 in European telecom infrastructure and enterprises, the vulnerability could affect critical network infrastructure, impacting data privacy and network stability.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the seg6_input_core() memory leak as soon as it becomes available in your distribution's kernel updates. 2. Monitor kernel updates from your Linux vendor and prioritize updates for systems handling IPv6 SRv6 traffic. 3. If immediate patching is not possible, consider disabling IPv6 Segment Routing features temporarily on critical systems to mitigate exposure. 4. Implement resource monitoring on network devices and servers to detect abnormal memory usage patterns that could indicate exploitation attempts or leaks. 5. Employ network segmentation and strict firewall rules to limit exposure of vulnerable systems to untrusted IPv6 traffic, reducing the attack surface. 6. Conduct regular audits of network traffic and kernel logs for anomalies related to SRv6 processing failures. 7. Collaborate with Linux distribution maintainers to ensure timely backporting of the patch to long-term support kernels widely used in enterprise environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-39490: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix missing sk_buff release in seg6_input_core The seg6_input() function is responsible for adding the SRH into a packet, delegating the operation to the seg6_input_core(). This function uses the skb_cow_head() to ensure that there is sufficient headroom in the sk_buff for accommodating the link-layer header. In the event that the skb_cow_header() function fails, the seg6_input_core() catches the error but it does not release the sk_buff, which will result in a memory leak. This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due to headroom too small after SRH push") and persists even after commit 7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"), where the entire seg6_input() code was refactored to deal with netfilter hooks. The proposed patch addresses the identified memory leak by requiring the seg6_input_core() function to release the sk_buff in the event that skb_cow_head() fails.
AI-Powered Analysis
Technical Analysis
CVE-2024-39490 is a medium severity vulnerability in the Linux kernel's IPv6 Segment Routing (SRv6) implementation, specifically within the seg6_input_core() function. The vulnerability arises from a memory leak caused by improper handling of sk_buff (socket buffer) objects when skb_cow_head() fails. The seg6_input() function, which processes IPv6 packets with Segment Routing Headers (SRH), delegates to seg6_input_core() to ensure sufficient headroom in the sk_buff for link-layer headers. If skb_cow_head() fails to allocate or copy the buffer headroom, seg6_input_core() catches the error but neglects to release the sk_buff, resulting in a memory leak (classified as CWE-401: Improper Release of Memory Before Removing Last Reference). This flaw was introduced in commit af3b5158b89d and persisted through subsequent refactoring, including commit 7a3f5b0de364 that added netfilter hooks to the SRv6 data plane. The patch requires seg6_input_core() to properly release the sk_buff upon failure of skb_cow_head(), preventing the leak. The vulnerability does not require privileges or user interaction to exploit and has a CVSS 3.1 score of 6.2, indicating a medium severity. The impact is limited to confidentiality loss, as indicated by the CVSS vector (C:H/I:N/A:N), suggesting potential information disclosure through memory exhaustion or side effects of the leak, but no integrity or availability impact is noted. No known exploits are currently in the wild.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running Linux kernels with affected versions that handle IPv6 traffic using Segment Routing. The memory leak could lead to gradual resource exhaustion on network devices or servers processing SRv6 packets, potentially causing degraded performance or denial of service if memory consumption grows unchecked. While the CVSS indicates no direct availability impact, in high-throughput or critical network environments, such leaks can indirectly affect service reliability. Confidentiality impact suggests that sensitive data might be exposed if memory is improperly managed, although the exact leakage vector is not detailed. Organizations relying on Linux-based routers, firewalls, or servers with IPv6 SRv6 enabled should be particularly vigilant. Given the increasing adoption of IPv6 and SRv6 in European telecom infrastructure and enterprises, the vulnerability could affect critical network infrastructure, impacting data privacy and network stability.
Mitigation Recommendations
1. Apply the official Linux kernel patch that fixes the seg6_input_core() memory leak as soon as it becomes available in your distribution's kernel updates. 2. Monitor kernel updates from your Linux vendor and prioritize updates for systems handling IPv6 SRv6 traffic. 3. If immediate patching is not possible, consider disabling IPv6 Segment Routing features temporarily on critical systems to mitigate exposure. 4. Implement resource monitoring on network devices and servers to detect abnormal memory usage patterns that could indicate exploitation attempts or leaks. 5. Employ network segmentation and strict firewall rules to limit exposure of vulnerable systems to untrusted IPv6 traffic, reducing the attack surface. 6. Conduct regular audits of network traffic and kernel logs for anomalies related to SRv6 processing failures. 7. Collaborate with Linux distribution maintainers to ensure timely backporting of the patch to long-term support kernels widely used in enterprise environments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-06-25T14:23:23.747Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9829c4522896dcbe2d4e
Added to database: 5/21/2025, 9:08:57 AM
Last enriched: 6/29/2025, 12:42:38 PM
Last updated: 7/31/2025, 10:00:16 PM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.