Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-27016
HistoryMay 01, 2024 - 5:29 a.m.

CVE-2024-27016 netfilter: flowtable: validate pppoe header

2024-05-0105:29:57
Linux
github.com
3
cve-2024-27016
netfilter
flowtable
validate
pppoe header
vulnerability
linux kernel

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate pppoe header

Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.

CNA Affected

[
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "72efd585f714",
        "lessThan": "d06977b9a410",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "72efd585f714",
        "lessThan": "8bf7c76a2a20",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "72efd585f714",
        "lessThan": "a2471d271042",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "72efd585f714",
        "lessThan": "cf366ee3bc1b",
        "versionType": "git"
      },
      {
        "status": "affected",
        "version": "72efd585f714",
        "lessThan": "87b3593bed18",
        "versionType": "git"
      }
    ],
    "programFiles": [
      "include/net/netfilter/nf_flow_table.h",
      "net/netfilter/nf_flow_table_inet.c",
      "net/netfilter/nf_flow_table_ip.c"
    ],
    "defaultStatus": "unaffected"
  },
  {
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "vendor": "Linux",
    "product": "Linux",
    "versions": [
      {
        "status": "affected",
        "version": "5.13"
      },
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "5.13",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "5.15.157",
        "versionType": "custom",
        "lessThanOrEqual": "5.15.*"
      },
      {
        "status": "unaffected",
        "version": "6.1.88",
        "versionType": "custom",
        "lessThanOrEqual": "6.1.*"
      },
      {
        "status": "unaffected",
        "version": "6.6.29",
        "versionType": "custom",
        "lessThanOrEqual": "6.6.*"
      },
      {
        "status": "unaffected",
        "version": "6.8.8",
        "versionType": "custom",
        "lessThanOrEqual": "6.8.*"
      },
      {
        "status": "unaffected",
        "version": "6.9",
        "versionType": "original_commit_for_fix",
        "lessThanOrEqual": "*"
      }
    ],
    "programFiles": [
      "include/net/netfilter/nf_flow_table.h",
      "net/netfilter/nf_flow_table_inet.c",
      "net/netfilter/nf_flow_table_ip.c"
    ],
    "defaultStatus": "affected"
  }
]

AI Score

6.8

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial