CVE-2024-35962

Updated: 2024-08-13 02:33:35.351472

Description:

In the Linux kernel, the following vulnerability has been resolved: netfilter: complete validation of user input In my recent commit, I missed that do_replace() handlers use copy_from_sockptr() (which I fixed), followed by unsafe copy_from_sockptr_offset() calls. In all functions, we can perform the @optlen validation before even calling xt_alloc_table_info() with the following check: if ((u64)optlen < (u64)tmp.size + sizeof(tmp)) return -EINVAL;


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1743193221 2024-09-02 17:23:49
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:24:31
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-08-13 14:24:30
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727690947 2024-09-30 10:53:48
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727690025 2024-09-30 10:53:49
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727815919 2024-10-01 17:36:32
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:24:31
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-08-13 14:24:30
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:24:30