Assigner | Linux |
Reserved | 2024-02-19 |
Published | 2024-05-01 |
Updated | 2024-06-14 |
Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header offset. This bug causes a mismatch in the flow table lookup, so pppoe packets enter the classical forwarding path.
Product status
72efd585f714 before e719b52d0c56
72efd585f714 before f1c3c61701a0
72efd585f714 before 4ed82dd368ad
72efd585f714 before e3f078103421
72efd585f714 before 6db5dc7b351b
5.13
Any version before 5.13
5.15.157
6.1.88
6.6.29
6.8.8
6.9
References
https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56
https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2
https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d
https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d
https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27