CVE-2024-35962

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2024
Last modified:
17/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: complete validation of user input<br /> <br /> In my recent commit, I missed that do_replace() handlers<br /> use copy_from_sockptr() (which I fixed), followed<br /> by unsafe copy_from_sockptr_offset() calls.<br /> <br /> In all functions, we can perform the @optlen validation<br /> before even calling xt_alloc_table_info() with the following<br /> check:<br /> <br /> if ((u64)optlen

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.154 (including) 5.15.156 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.1.85 (including) 6.1.87 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.26 (including) 6.6.28 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8.5 (including) 6.8.7 (excluding)
cpe:2.3:o:linux:linux_kernel:5.10.215:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*