CVE-2024-2397
Published: April 13, 2024Last modified: June 9, 2025
Description
Due to a bug in packet data buffers management, the PPP printer in tcpdump can enter an infinite loop when reading a crafted DLT_PPP_SERIAL .pcap savefile. This problem does not affect any tcpdump release, but it affected the git master branch from 2023-06-05 to 2024-03-21.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 6.2 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | tcpdump | Not affected (4.99.1-r4) |
| Stream | tcpdump | Not affected (4.99.1-r4) |
References
- https://github.com/the-tcpdump-group/tcpdump/commit/b9811ef5bb1b7d45a90e042f81f3aaf233c8bcb2
- https://lists.fedoraproject.org/archives/list/[email protected]/message/GEZRGR3QCW2ZNFIAWMZZOG4ZLFLFNG2M/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/HUUI2MBVHFENXNBCHDQZP2RBBA2VD5HG/
- https://lists.freebsd.org/archives/freebsd-security/2024-September/000298.html