CVE-2024-35962Linux vulnerability

6 documents6 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 20

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_offset() calls. In all functions, we can perform the @optlen validation before even calling xt_alloc_table_info() with the following check: if ((u64)optlen < (u64)tmp.size + sizeof(tmp)) return -EINVAL;

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

NVDlinux/linux_kernel5.15.1545.15.156+5
Debianlinux/linux_kernel< 5.10.216-1+3
CVEListV5linux/linux0f038242b77ddfc505bf4163d4904c1abd2e74d6cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05+10
debiandebian/linux< linux 6.1.90-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
OSV
CVE-2024-35962: In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do2024-05-20
GHSA
GHSA-j7rq-227r-98j4: In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that2024-05-20

📋Vendor Advisories

2
Red Hat
kernel: netfilter: complete validation of user input2024-05-20
Debian
CVE-2024-35962: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...2024

💬Community

1
Bugzilla
CVE-2024-35962 kernel: netfilter: complete validation of user input2024-05-20