We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: incorrect pppoe tuple pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header offset. This bug causes a mismatch in the flow table lookup, so pppoe packets enter the classical forwarding path.
Reserved 2024-02-19 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/e719b52d0c56989b0f3475a03a6d64f182c85b56
git.kernel.org/...c/f1c3c61701a0b12f4906152c1626a5de580ea3d2
git.kernel.org/...c/4ed82dd368ad883dc4284292937b882f044e625d
git.kernel.org/...c/e3f078103421642fcd5f05c5e70777feb10f000d
git.kernel.org/...c/6db5dc7b351b9569940cd1cf445e237c42cd6d27
Support options