5.5
CVE-2024-35962
- EPSS 0.01%
- Veröffentlicht 20.05.2024 10:15:11
- Zuletzt bearbeitet 17.12.2025 03:37:16
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
netfilter: complete validation of user input
In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.
In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:
if ((u64)optlen < (u64)tmp.size + sizeof(tmp))
return -EINVAL;Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version >= 5.15.154 < 5.15.156
Linux ≫ Linux Kernel Version >= 6.1.85 < 6.1.87
Linux ≫ Linux Kernel Version >= 6.6.26 < 6.6.28
Linux ≫ Linux Kernel Version >= 6.8.5 < 6.8.7
Linux ≫ Linux Kernel Version5.10.215
Linux ≫ Linux Kernel Version6.9 Updaterc3
Debian ≫ Debian Linux Version10.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.013 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|