Vulnerability Details CVE-2024-35962
In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.
In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:
if ((u64)optlen < (u64)tmp.size + sizeof(tmp))
return -EINVAL;
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.4%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2024-35962
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:linux:linux_kernel:5.10.215
-
cpe:2.3:o:linux:linux_kernel:5.15.154
-
cpe:2.3:o:linux:linux_kernel:5.15.155
-
cpe:2.3:o:linux:linux_kernel:6.1.85
-
cpe:2.3:o:linux:linux_kernel:6.1.86
-
cpe:2.3:o:linux:linux_kernel:6.6.26
-
cpe:2.3:o:linux:linux_kernel:6.6.27
-
cpe:2.3:o:linux:linux_kernel:6.8.5
-
cpe:2.3:o:linux:linux_kernel:6.8.6
-
cpe:2.3:o:linux:linux_kernel:6.9