CVE-2024-27015

Source
https://cve.org/CVERecord?id=CVE-2024-27015
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27015.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27015
Downstream
Related
Published
2024-05-01T05:29:52.281Z
Modified
2026-05-07T04:15:41.928700Z
Summary
netfilter: flowtable: incorrect pppoe tuple
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: incorrect pppoe tuple

pppoe traffic reaching ingress path does not match the flowtable entry because the pppoe header is expected to be at the network header offset. This bug causes a mismatch in the flow table lookup, so pppoe packets enter the classical forwarding path.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27015.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
72efd585f7144a047f7da63864284764596ccad9
Fixed
e719b52d0c56989b0f3475a03a6d64f182c85b56
Fixed
f1c3c61701a0b12f4906152c1626a5de580ea3d2
Fixed
4ed82dd368ad883dc4284292937b882f044e625d
Fixed
e3f078103421642fcd5f05c5e70777feb10f000d
Fixed
6db5dc7b351b9569940cd1cf445e237c42cd6d27

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27015.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.157
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.88
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.29
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.8.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27015.json"