Lucene search

K
cveLinuxCVE-2024-27016
HistoryMay 01, 2024 - 6:15 a.m.

CVE-2024-27016

2024-05-0106:15:20
Linux
web.nvd.nist.gov
60
linux kernel
vulnerability
cve-2024-27016
resolved
validating pppoe header
nvd
netfilter
flowtable
protocol field

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate pppoe header

Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange5.135.15.157
OR
linuxlinux_kernelRange5.166.1.88
OR
linuxlinux_kernelRange6.26.6.29
OR
linuxlinux_kernelRange6.76.8.8
OR
linuxlinux_kernelMatch6.9rc1
OR
linuxlinux_kernelMatch6.9rc2
OR
linuxlinux_kernelMatch6.9rc3
OR
linuxlinux_kernelMatch6.9rc4
Node
fedoraprojectfedoraMatch38
OR
fedoraprojectfedoraMatch39
OR
fedoraprojectfedoraMatch40
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
fedoraprojectfedora38cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
fedoraprojectfedora39cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
fedoraprojectfedora40cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_flow_table.h",
      "net/netfilter/nf_flow_table_inet.c",
      "net/netfilter/nf_flow_table_ip.c"
    ],
    "versions": [
      {
        "version": "72efd585f714",
        "lessThan": "d06977b9a410",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "72efd585f714",
        "lessThan": "8bf7c76a2a20",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "72efd585f714",
        "lessThan": "a2471d271042",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "72efd585f714",
        "lessThan": "cf366ee3bc1b",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "72efd585f714",
        "lessThan": "87b3593bed18",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/net/netfilter/nf_flow_table.h",
      "net/netfilter/nf_flow_table_inet.c",
      "net/netfilter/nf_flow_table_ip.c"
    ],
    "versions": [
      {
        "version": "5.13",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.13",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.157",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.88",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.29",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.8",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.3

Confidence

Low

EPSS

0

Percentile

5.1%