CVE-2024-41044

In the Linux kernel, the following vulnerability has been resolved: ppp: reject claimed-as-LCP but actually malformed packets Since 'ppp_async_encode()' assumes valid LCP packets (with code from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that LCP packet has an actual body beyond PPP_LCP header bytes, and reject claimed-as-LCP but actually malformed data otherwise.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*

History

09 Oct 2025, 18:19

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 - () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 - Patch
References () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 - () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 - Patch
References () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 - () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 - Patch
References () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 - () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 - Patch
References () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 - () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 - Patch
References () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e - () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e - Patch
References () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f - () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f - Patch
References () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 - () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CWE NVD-CWE-noinfo

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 - () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 -
References () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 - () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 -
References () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 - () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 -
References () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 - () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 -
References () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 - () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 -
References () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e - () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e -
References () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f - () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f -
References () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 - () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ppp: rechazar paquetes reclamados como LCP pero en realidad con formato incorrecto Dado que 'ppp_async_encode()' asume paquetes LCP válidos (con código del 1 al 7 inclusive), agregue 'ppp_check_packet()' para garantizar que el paquete LCP tenga un cuerpo real más allá de los bytes del encabezado PPP_LCP y, de lo contrario, rechace los datos reclamados como LCP pero en realidad con formato incorrecto.

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-09 18:19


NVD link : CVE-2024-41044

Mitre link : CVE-2024-41044

CVE.ORG link : CVE-2024-41044


JSON object : View

Products Affected

linux

  • linux_kernel