In the Linux kernel, the following vulnerability has been resolved:
ppp: reject claimed-as-LCP but actually malformed packets
Since 'pppasyncencode()' assumes valid LCP packets (with code from 1 to 7 inclusive), add 'pppcheckpacket()' to ensure that LCP packet has an actual body beyond PPP_LCP header bytes, and reject claimed-as-LCP but actually malformed data otherwise.
{ "vanir_signatures": [ { "digest": { "line_hashes": [ "202419508836948715679200509787826063733", "293083978878105467316192782044462510087", "182881831767667315739563974991652819409", "204671176556266270617222222187814624847", "241866382872533103466368646636727451012", "154281082454301091660070062501021802325", "90465047859438905807687140230718121475", "187580707892994021841250246117773979060", "90563585078386692197305394974490815729", "112806078785646103737115079582282332486" ], "threshold": 0.9 }, "target": { "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ebc5c630457783d17d0c438b0ad70b232a64a82f", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-005060fb" }, { "digest": { "length": 691.0, "function_hash": "114285760711879431841579645863339814148" }, "target": { "function": "ppp_write", "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3134bdf7356ed952dcecb480861d2afcc1e40492", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-30c8a3b3" }, { "digest": { "line_hashes": [ "202419508836948715679200509787826063733", "293083978878105467316192782044462510087", "182881831767667315739563974991652819409", "204671176556266270617222222187814624847", "241866382872533103466368646636727451012", "154281082454301091660070062501021802325", "90465047859438905807687140230718121475", "187580707892994021841250246117773979060", "90563585078386692197305394974490815729", "112806078785646103737115079582282332486" ], "threshold": 0.9 }, "target": { "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3134bdf7356ed952dcecb480861d2afcc1e40492", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-5058cdf2" }, { "digest": { "line_hashes": [ "202419508836948715679200509787826063733", "293083978878105467316192782044462510087", "182881831767667315739563974991652819409", "204671176556266270617222222187814624847", "241866382872533103466368646636727451012", "154281082454301091660070062501021802325", "90465047859438905807687140230718121475", "187580707892994021841250246117773979060", "90563585078386692197305394974490815729", "112806078785646103737115079582282332486" ], "threshold": 0.9 }, "target": { "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Line", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-5c920c2f" }, { "digest": { "length": 691.0, "function_hash": "114285760711879431841579645863339814148" }, "target": { "function": "ppp_write", "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ebc5c630457783d17d0c438b0ad70b232a64a82f", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-9b3d032a" }, { "digest": { "length": 691.0, "function_hash": "114285760711879431841579645863339814148" }, "target": { "function": "ppp_write", "file": "drivers/net/ppp/ppp_generic.c" }, "signature_type": "Function", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-41044-c5d2e1d8" } ] }