| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: complete validation of user input\n\nIn my recent commit, I missed that do_replace() handlers\nuse copy_from_sockptr() (which I fixed), followed\nby unsafe copy_from_sockptr_offset() calls.\n\nIn all functions, we can perform the @optlen validation\nbefore even calling xt_alloc_table_info() with the following\ncheck:\n\nif ((u64)optlen < (u64)tmp.size + sizeof(tmp))\n return -EINVAL;" |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/ipv4/netfilter/arp_tables.c", |
| "net/ipv4/netfilter/ip_tables.c", |
| "net/ipv6/netfilter/ip6_tables.c" |
| ], |
| "versions": [ |
| { |
| "version": "0f038242b77ddfc505bf4163d4904c1abd2e74d6", |
| "lessThan": "cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "440e948cf0eff32cfe322dcbca3f2525354b159b", |
| "lessThan": "97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "18aae2cb87e5faa9c5bd865260ceadac60d5a6c5", |
| "lessThan": "c760089aa98289b4b88a7ff5a62dd92845adf223", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525", |
| "lessThan": "89242d9584c342cb83311b598d9e6b82572eadf8", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018", |
| "lessThan": "562b7245131f6e9f1d280c8b5a8750f03edfc05c", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "0c83842df40f86e529db6842231154772c20edcc", |
| "lessThan": "65acf6e0501ac8880a4f73980d01b5d27648b956", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "net/ipv4/netfilter/arp_tables.c", |
| "net/ipv4/netfilter/ip_tables.c", |
| "net/ipv6/netfilter/ip6_tables.c" |
| ], |
| "versions": [ |
| { |
| "version": "5.10.215", |
| "lessThan": "5.10.216", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.154", |
| "lessThan": "5.15.156", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.85", |
| "lessThan": "6.1.87", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.26", |
| "lessThan": "6.6.28", |
| "status": "affected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.8.5", |
| "lessThan": "6.8.7", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.10.215", |
| "versionEndExcluding": "5.10.216" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.15.154", |
| "versionEndExcluding": "5.15.156" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1.85", |
| "versionEndExcluding": "6.1.87" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.6.26", |
| "versionEndExcluding": "6.6.28" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.8.5", |
| "versionEndExcluding": "6.8.7" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/c760089aa98289b4b88a7ff5a62dd92845adf223" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/89242d9584c342cb83311b598d9e6b82572eadf8" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/562b7245131f6e9f1d280c8b5a8750f03edfc05c" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/65acf6e0501ac8880a4f73980d01b5d27648b956" |
| } |
| ], |
| "title": "netfilter: complete validation of user input", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2024-35962", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |