In the Linux kernel, the following vulnerability has been resolved:
netfilter: flowtable: validate pppoe header
Ensure there is sufficient room to access the protocol field of the PPPoe header. Validate it once before the flowtable lookup, then use a helper function to access protocol field.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"188631179341830749567843528780721323365",
"269458854647636332259366273695523054262",
"152050744066727064762641827813050586018",
"156295838013913214542025743661139037528",
"206285597887038205633753154168401741728",
"159446807252257311914142040558201170334",
"166642312248707393775408050473007130973"
],
"threshold": 0.9
},
"target": {
"file": "include/net/netfilter/nf_flow_table.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06977b9a4109f8738bb276125eb6a0b772bc433",
"signature_version": "v1",
"id": "CVE-2024-27016-0fdb387c"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 556.0,
"function_hash": "326397581443292703604690028158379327914"
},
"target": {
"file": "net/netfilter/nf_flow_table_inet.c",
"function": "nf_flow_offload_inet_hook"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06977b9a4109f8738bb276125eb6a0b772bc433",
"signature_version": "v1",
"id": "CVE-2024-27016-5855adb1"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"114064315814603641498923945703668996607",
"230666566574158376836591301756777530474",
"289046309286323409594035834830300087679",
"165482836351479038570827857566310793008",
"80074629449300882253238972636808500328",
"178434229523457682361008080627135995099",
"245390546248935576601106742571633213495",
"89210782681365715396934359433510054092",
"141669244066653425759867528261161532573",
"230465999004056328218054921666827881556",
"273072569731906357015714687779952745436",
"112886553985021036500964243197686734627",
"249807296148366154841399525140548956674",
"319818064834830033925006879639799329228",
"84417571075906264776713591439420430108"
],
"threshold": 0.9
},
"target": {
"file": "net/netfilter/nf_flow_table_ip.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"signature_version": "v1",
"id": "CVE-2024-27016-5c5e2ed9"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 427.0,
"function_hash": "316165414731200860388584917701046247706"
},
"target": {
"file": "net/netfilter/nf_flow_table_ip.c",
"function": "nf_flow_skb_encap_protocol"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06977b9a4109f8738bb276125eb6a0b772bc433",
"signature_version": "v1",
"id": "CVE-2024-27016-5d68c56c"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 556.0,
"function_hash": "326397581443292703604690028158379327914"
},
"target": {
"file": "net/netfilter/nf_flow_table_inet.c",
"function": "nf_flow_offload_inet_hook"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"signature_version": "v1",
"id": "CVE-2024-27016-5d7e1707"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"183422939270043151753774313630641564556",
"59562700438703932152312408479760194921",
"44670368796487132243418752947277755528",
"175745998191947261432253960254913115776"
],
"threshold": 0.9
},
"target": {
"file": "net/netfilter/nf_flow_table_inet.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"signature_version": "v1",
"id": "CVE-2024-27016-5e57b46b"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"183422939270043151753774313630641564556",
"59562700438703932152312408479760194921",
"44670368796487132243418752947277755528",
"175745998191947261432253960254913115776"
],
"threshold": 0.9
},
"target": {
"file": "net/netfilter/nf_flow_table_inet.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06977b9a4109f8738bb276125eb6a0b772bc433",
"signature_version": "v1",
"id": "CVE-2024-27016-614ab9fe"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"188631179341830749567843528780721323365",
"269458854647636332259366273695523054262",
"152050744066727064762641827813050586018",
"156295838013913214542025743661139037528",
"206285597887038205633753154168401741728",
"159446807252257311914142040558201170334",
"166642312248707393775408050473007130973"
],
"threshold": 0.9
},
"target": {
"file": "include/net/netfilter/nf_flow_table.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"signature_version": "v1",
"id": "CVE-2024-27016-700913c6"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 427.0,
"function_hash": "316165414731200860388584917701046247706"
},
"target": {
"file": "net/netfilter/nf_flow_table_ip.c",
"function": "nf_flow_skb_encap_protocol"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8bf7c76a2a207ca2b4cfda0a279192adf27678d7",
"signature_version": "v1",
"id": "CVE-2024-27016-7f455edb"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"114064315814603641498923945703668996607",
"230666566574158376836591301756777530474",
"289046309286323409594035834830300087679",
"165482836351479038570827857566310793008",
"80074629449300882253238972636808500328",
"178434229523457682361008080627135995099",
"245390546248935576601106742571633213495",
"89210782681365715396934359433510054092",
"141669244066653425759867528261161532573",
"230465999004056328218054921666827881556",
"273072569731906357015714687779952745436",
"112886553985021036500964243197686734627",
"249807296148366154841399525140548956674",
"319818064834830033925006879639799329228",
"84417571075906264776713591439420430108"
],
"threshold": 0.9
},
"target": {
"file": "net/netfilter/nf_flow_table_ip.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d06977b9a4109f8738bb276125eb6a0b772bc433",
"signature_version": "v1",
"id": "CVE-2024-27016-afc60c30"
}
]