CVE-2024-35962

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35962
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35962.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-35962
Downstream
Related
Published
2024-05-20T09:41:53Z
Modified
2025-10-17T06:51:06.626842Z
Summary
netfilter: complete validation of user input
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that doreplace() handlers use copyfromsockptr() (which I fixed), followed by unsafe copyfromsockptroffset() calls.

In all functions, we can perform the @optlen validation before even calling xtalloctable_info() with the following check:

if ((u64)optlen < (u64)tmp.size + sizeof(tmp)) return -EINVAL;

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0f038242b77ddfc505bf4163d4904c1abd2e74d6
Fixed
cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
440e948cf0eff32cfe322dcbca3f2525354b159b
Fixed
97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
18aae2cb87e5faa9c5bd865260ceadac60d5a6c5
Fixed
c760089aa98289b4b88a7ff5a62dd92845adf223
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525
Fixed
89242d9584c342cb83311b598d9e6b82572eadf8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018
Fixed
562b7245131f6e9f1d280c8b5a8750f03edfc05c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0c83842df40f86e529db6842231154772c20edcc
Fixed
65acf6e0501ac8880a4f73980d01b5d27648b956

Affected versions

v5.*

v5.10.215
v5.15.154
v5.15.155

v6.*

v6.1.85
v6.1.86
v6.6.26
v6.6.27
v6.8.5
v6.8.6
v6.9-rc2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.10.215
Fixed
5.10.216
Type
ECOSYSTEM
Events
Introduced
5.15.154
Fixed
5.15.156
Type
ECOSYSTEM
Events
Introduced
6.1.85
Fixed
6.1.87
Type
ECOSYSTEM
Events
Introduced
6.6.26
Fixed
6.6.28
Type
ECOSYSTEM
Events
Introduced
6.8.5
Fixed
6.8.7