Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2024-27015
HistoryMay 01, 2024 - 6:15 a.m.

CVE-2024-27015

2024-05-0106:15:20
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux kernel
netfilter
flowtable
pppoe
tuple
vulnerability

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: incorrect pppoe tuple

pppoe traffic reaching ingress path does not match the flowtable entry
because the pppoe header is expected to be at the network header offset.
This bug causes a mismatch in the flow table lookup, so pppoe packets
enter the classical forwarding path.

Affected configurations

NVD
Node
linuxlinux_kernelRange5.135.15.157
OR
linuxlinux_kernelRange5.166.1.88
OR
linuxlinux_kernelRange6.26.6.29
OR
linuxlinux_kernelRange6.76.8.8
OR
linuxlinux_kernelMatch6.9rc1
OR
linuxlinux_kernelMatch6.9rc2
OR
linuxlinux_kernelMatch6.9rc3
OR
linuxlinux_kernelMatch6.9rc4
Node
fedoraprojectfedoraMatch38
OR
fedoraprojectfedoraMatch39
OR
fedoraprojectfedoraMatch40

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%