In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix potential uninit-value access in _ip6make_skb()
As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in _ipmakeskb()") for IPv4, check FLOWIFLAGKNOWNNH on fl6->flowi6_flags instead of testing HDRINCL on the socket to avoid a race condition which causes uninit-value access.
[
{
"signature_type": "Line",
"id": "CVE-2024-36903-0421e1ea",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"81598796712767686619679973014898930739",
"165917464453700452482214346746643025184",
"302190006069604630406976000941083148110",
"158778499112995413791926141099303093478"
]
},
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68c8ba16ab712eb709c6bab80ff151079d11d97a"
},
{
"signature_type": "Function",
"id": "CVE-2024-36903-05f18add",
"signature_version": "v1",
"digest": {
"length": 1974.0,
"function_hash": "95458246842809171422201592607763508296"
},
"deprecated": false,
"target": {
"function": "__ip6_make_skb",
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a05c1ede50e9656f0752e523c7b54f3a3489e9a8"
},
{
"signature_type": "Line",
"id": "CVE-2024-36903-27ec524c",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"81598796712767686619679973014898930739",
"165917464453700452482214346746643025184",
"302190006069604630406976000941083148110",
"158778499112995413791926141099303093478"
]
},
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e13d3a9c25b7080f8a619f961e943fe08c2672c"
},
{
"signature_type": "Function",
"id": "CVE-2024-36903-55c26c28",
"signature_version": "v1",
"digest": {
"length": 1948.0,
"function_hash": "324131388227200704191413841117040572345"
},
"deprecated": false,
"target": {
"function": "__ip6_make_skb",
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2367bf254f3a27ecc6e229afd7a8b0a1395f7be3"
},
{
"signature_type": "Function",
"id": "CVE-2024-36903-61739d31",
"signature_version": "v1",
"digest": {
"length": 1948.0,
"function_hash": "324131388227200704191413841117040572345"
},
"deprecated": false,
"target": {
"function": "__ip6_make_skb",
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e13d3a9c25b7080f8a619f961e943fe08c2672c"
},
{
"signature_type": "Line",
"id": "CVE-2024-36903-6d950f1a",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"81598796712767686619679973014898930739",
"165917464453700452482214346746643025184",
"302190006069604630406976000941083148110",
"158778499112995413791926141099303093478"
]
},
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2367bf254f3a27ecc6e229afd7a8b0a1395f7be3"
},
{
"signature_type": "Function",
"id": "CVE-2024-36903-7886ba74",
"signature_version": "v1",
"digest": {
"length": 1968.0,
"function_hash": "322380051731246750077884189313795255917"
},
"deprecated": false,
"target": {
"function": "__ip6_make_skb",
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@68c8ba16ab712eb709c6bab80ff151079d11d97a"
},
{
"signature_type": "Line",
"id": "CVE-2024-36903-af575f38",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"324003809294373949921047430067810098896",
"298241997807262332783117546767111126614",
"11969641813064037208813939578194041575",
"30848482067372102113753547107977928888"
]
},
"deprecated": false,
"target": {
"file": "net/ipv6/ip6_output.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a05c1ede50e9656f0752e523c7b54f3a3489e9a8"
}
]