In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix memleak in seg6_hmac_init_algo
seg6_hmac_init_algo returns without cleaning up the previous allocations
if one fails, so it's going to leak all that memory and the crypto tfms.
Update seg6_hmac_exit to only free the memory when allocated, so we can
reuse the code directly.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0e44d6cbe8de983470c3d2f978649783384fdcb6 - Patch | |
References | () https://git.kernel.org/stable/c/4a3fcf53725b70010d1cf869a2ba549fed6b8fb3 - Patch | |
References | () https://git.kernel.org/stable/c/599a5654215092ac22bfc453f4fd3959c55ea821 - Patch | |
References | () https://git.kernel.org/stable/c/61d31ac85b4572d11f8071855c0ccb4f32d76c0c - Patch | |
References | () https://git.kernel.org/stable/c/afd5730969aec960a2fee4e5ee839a6014643976 - Patch | |
References | () https://git.kernel.org/stable/c/daf341e0a2318b813427d5a78788c86f4a7f02be - Patch | |
References | () https://git.kernel.org/stable/c/efb9f4f19f8e37fde43dfecebc80292d179f56c6 - Patch | |
References | () https://git.kernel.org/stable/c/f6a99ef4e056c20a138a95cc51332b2b96c8f383 - Patch |
31 Jul 2024, 14:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-401 | |
First Time |
Linux
Linux linux Kernel |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/0e44d6cbe8de983470c3d2f978649783384fdcb6 - Patch | |
References | () https://git.kernel.org/stable/c/4a3fcf53725b70010d1cf869a2ba549fed6b8fb3 - Patch | |
References | () https://git.kernel.org/stable/c/599a5654215092ac22bfc453f4fd3959c55ea821 - Patch | |
References | () https://git.kernel.org/stable/c/61d31ac85b4572d11f8071855c0ccb4f32d76c0c - Patch | |
References | () https://git.kernel.org/stable/c/afd5730969aec960a2fee4e5ee839a6014643976 - Patch | |
References | () https://git.kernel.org/stable/c/daf341e0a2318b813427d5a78788c86f4a7f02be - Patch | |
References | () https://git.kernel.org/stable/c/efb9f4f19f8e37fde43dfecebc80292d179f56c6 - Patch | |
References | () https://git.kernel.org/stable/c/f6a99ef4e056c20a138a95cc51332b2b96c8f383 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
11 Jul 2024, 13:05
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-10 08:15
Updated : 2024-11-21 09:27
NVD link : CVE-2024-39489
Mitre link : CVE-2024-39489
CVE.ORG link : CVE-2024-39489
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime