CVE-2024-46754: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops. The syzbot reported that the lwt_seg6 related BPF ops can be invoked via bpf_test_run() without without entering input_action_end_bpf() first. Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self test case but each BPF function expects it. Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
AI Analysis
Technical Summary
CVE-2024-46754 addresses a vulnerability in the Linux kernel related to the Berkeley Packet Filter (BPF) subsystem, specifically the lwt_seg6local BPF program type. The issue arises from the ability to invoke certain lwt_seg6local BPF operations via the bpf_test_run() function without first entering the expected input_action_end_bpf() context. This improper invocation path bypasses the intended state initialization, particularly the per-CPU variable seg6_bpf_srh_states::srh, which is expected by each BPF function but is never assigned during the self-test scenario. The root cause stems from the introduction of the BPF_PROG_TYPE_LWT_SEG6LOCAL self-test in commit 04d4b274e2a, which did not correctly initialize this state variable, leading to inconsistent behavior and potential undefined states. The fix involves removing the test_run functionality for this BPF program type to prevent misuse and ensure proper state handling. Although no known exploits are currently reported in the wild, the vulnerability could potentially allow attackers with the ability to load and execute BPF programs to cause unexpected kernel behavior or crashes due to improper state management. This vulnerability is subtle and primarily affects kernel developers or environments where untrusted BPF programs might be executed, especially those leveraging Segment Routing over IPv6 (SRv6) with local actions (seg6local).
Potential Impact
For European organizations, the impact of CVE-2024-46754 depends largely on their use of Linux systems with kernel versions containing the vulnerable commit and their deployment of BPF programs, particularly those using SRv6 local actions. Organizations operating network infrastructure, cloud services, or telecom equipment running Linux kernels with this vulnerability could face risks of kernel instability or denial of service if malicious or malformed BPF programs are executed. This could disrupt critical network functions or services, impacting availability. Confidentiality and integrity impacts are less direct but could arise if kernel crashes or undefined states lead to broader system compromises or facilitate privilege escalation in complex attack chains. Given the increasing adoption of BPF for networking, monitoring, and security purposes, the vulnerability could affect data centers, ISPs, and enterprises relying on Linux-based routing or network function virtualization. However, exploitation requires the ability to load BPF programs, which is typically restricted to privileged users, limiting the attack surface to insider threats or attackers who have already gained elevated access.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions where this vulnerability is patched, removing the problematic test_run functionality for BPF_PROG_TYPE_LWT_SEG6LOCAL. Kernel maintainers and system administrators must ensure that all systems running affected kernel versions are upgraded to the latest stable releases incorporating this fix. Additionally, organizations should audit and restrict BPF program loading capabilities to trusted users only, employing Linux Security Modules (LSMs) like SELinux or AppArmor to enforce strict policies. Network operators using SRv6 features should verify their kernel versions and test their BPF programs for compatibility with the patch. Monitoring kernel logs for unusual BPF activity and employing runtime security tools that detect abnormal BPF program behavior can further reduce risk. For environments where kernel upgrades are delayed, disabling or restricting the use of seg6local BPF programs may be a temporary workaround. Finally, organizations should maintain robust incident response plans to quickly address any kernel-level anomalies potentially related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-46754: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Remove tst_run from lwt_seg6local_prog_ops. The syzbot reported that the lwt_seg6 related BPF ops can be invoked via bpf_test_run() without without entering input_action_end_bpf() first. Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self test case but each BPF function expects it. Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
AI-Powered Analysis
Technical Analysis
CVE-2024-46754 addresses a vulnerability in the Linux kernel related to the Berkeley Packet Filter (BPF) subsystem, specifically the lwt_seg6local BPF program type. The issue arises from the ability to invoke certain lwt_seg6local BPF operations via the bpf_test_run() function without first entering the expected input_action_end_bpf() context. This improper invocation path bypasses the intended state initialization, particularly the per-CPU variable seg6_bpf_srh_states::srh, which is expected by each BPF function but is never assigned during the self-test scenario. The root cause stems from the introduction of the BPF_PROG_TYPE_LWT_SEG6LOCAL self-test in commit 04d4b274e2a, which did not correctly initialize this state variable, leading to inconsistent behavior and potential undefined states. The fix involves removing the test_run functionality for this BPF program type to prevent misuse and ensure proper state handling. Although no known exploits are currently reported in the wild, the vulnerability could potentially allow attackers with the ability to load and execute BPF programs to cause unexpected kernel behavior or crashes due to improper state management. This vulnerability is subtle and primarily affects kernel developers or environments where untrusted BPF programs might be executed, especially those leveraging Segment Routing over IPv6 (SRv6) with local actions (seg6local).
Potential Impact
For European organizations, the impact of CVE-2024-46754 depends largely on their use of Linux systems with kernel versions containing the vulnerable commit and their deployment of BPF programs, particularly those using SRv6 local actions. Organizations operating network infrastructure, cloud services, or telecom equipment running Linux kernels with this vulnerability could face risks of kernel instability or denial of service if malicious or malformed BPF programs are executed. This could disrupt critical network functions or services, impacting availability. Confidentiality and integrity impacts are less direct but could arise if kernel crashes or undefined states lead to broader system compromises or facilitate privilege escalation in complex attack chains. Given the increasing adoption of BPF for networking, monitoring, and security purposes, the vulnerability could affect data centers, ISPs, and enterprises relying on Linux-based routing or network function virtualization. However, exploitation requires the ability to load BPF programs, which is typically restricted to privileged users, limiting the attack surface to insider threats or attackers who have already gained elevated access.
Mitigation Recommendations
European organizations should promptly update their Linux kernels to versions where this vulnerability is patched, removing the problematic test_run functionality for BPF_PROG_TYPE_LWT_SEG6LOCAL. Kernel maintainers and system administrators must ensure that all systems running affected kernel versions are upgraded to the latest stable releases incorporating this fix. Additionally, organizations should audit and restrict BPF program loading capabilities to trusted users only, employing Linux Security Modules (LSMs) like SELinux or AppArmor to enforce strict policies. Network operators using SRv6 features should verify their kernel versions and test their BPF programs for compatibility with the patch. Monitoring kernel logs for unusual BPF activity and employing runtime security tools that detect abnormal BPF program behavior can further reduce risk. For environments where kernel upgrades are delayed, disabling or restricting the use of seg6local BPF programs may be a temporary workaround. Finally, organizations should maintain robust incident response plans to quickly address any kernel-level anomalies potentially related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-09-11T15:12:18.270Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9826c4522896dcbe11e8
Added to database: 5/21/2025, 9:08:54 AM
Last enriched: 6/29/2025, 1:24:29 AM
Last updated: 7/27/2025, 2:58:59 PM
Views: 10
Related Threats
CVE-2025-49559: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) in Adobe Adobe Commerce
MediumCVE-2025-49558: Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) in Adobe Adobe Commerce
MediumCVE-2025-49557: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
HighCVE-2025-49556: Incorrect Authorization (CWE-863) in Adobe Adobe Commerce
HighCVE-2025-49555: Cross-Site Request Forgery (CSRF) (CWE-352) in Adobe Adobe Commerce
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.