CVE-2024-27015

critical

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header offset. This bug causes a mismatch in the flow table lookup, so pppoe packets enter the classical forwarding path.

References

https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2

https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56

https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d

https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27

https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d

Details

Source: Mitre, NVD

Published: 2024-05-01

Updated: 2024-05-13

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical