CVE-2024-35962 — Linux vulnerability
6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 20
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.
In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:
if ((u64)optlen < (u64)tmp.size + sizeof(tmp))
return -EINVAL;
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages4 packages
▶CVEListV5linux/linux0f038242b77ddfc505bf4163d4904c1abd2e74d6 — cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05+10
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
2OSV▶
CVE-2024-35962: In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do↗2024-05-20
GHSA▶
GHSA-j7rq-227r-98j4: In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that↗2024-05-20