Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-35962
HistoryMay 20, 2024 - 9:41 a.m.

CVE-2024-35962 netfilter: complete validation of user input

2024-05-2009:41:53
Linux
github.com
1
cve-2024-35962
netfilter
linux kernel
user input
validation
do_replace()
copy_from_sockptr()
copy_from_sockptr_offset()
optlen validation
xt_alloc_table_info()
tmp.size
-einval

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.

In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:

if ((u64)optlen < (u64)tmp.size + sizeof(tmp))
return -EINVAL;

AI Score

6.7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial