In the Linux kernel, the following vulnerability has been resolved:
ppp: reject claimed-as-LCP but actually malformed packets
Since 'ppp_async_encode()' assumes valid LCP packets (with code
from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that
LCP packet has an actual body beyond PPP_LCP header bytes, and
reject claimed-as-LCP but actually malformed data otherwise.
References
Configurations
Configuration 1 (hide)
|
History
09 Oct 2025, 18:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
References | () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 - Patch | |
References | () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 - Patch | |
References | () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 - Patch | |
References | () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 - Patch | |
References | () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 - Patch | |
References | () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e - Patch | |
References | () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f - Patch | |
References | () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
21 Nov 2024, 09:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/099502ca410922b56353ccef2749bc0de669da78 - | |
References | () https://git.kernel.org/stable/c/3134bdf7356ed952dcecb480861d2afcc1e40492 - | |
References | () https://git.kernel.org/stable/c/3ba12c2afd933fc1bf800f6d3f6c7ec8f602ce56 - | |
References | () https://git.kernel.org/stable/c/6e8f1c21174f9482033bbb59f13ce1a8cbe843c3 - | |
References | () https://git.kernel.org/stable/c/97d1efd8be26615ff680cdde86937d5943138f37 - | |
References | () https://git.kernel.org/stable/c/d683e7f3fc48f59576af34631b4fb07fd931343e - | |
References | () https://git.kernel.org/stable/c/ebc5c630457783d17d0c438b0ad70b232a64a82f - | |
References | () https://git.kernel.org/stable/c/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 - | |
Summary |
|
29 Jul 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 15:15
Updated : 2025-10-09 18:19
NVD link : CVE-2024-41044
Mitre link : CVE-2024-41044
CVE.ORG link : CVE-2024-41044
JSON object : View
Products Affected
linux
- linux_kernel
CWE