{"id":"CVE-2024-35962","summary":"netfilter: complete validation of user input","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: complete validation of user input\n\nIn my recent commit, I missed that do_replace() handlers\nuse copy_from_sockptr() (which I fixed), followed\nby unsafe copy_from_sockptr_offset() calls.\n\nIn all functions, we can perform the @optlen validation\nbefore even calling xt_alloc_table_info() with the following\ncheck:\n\nif ((u64)optlen \u003c (u64)tmp.size + sizeof(tmp))\n        return -EINVAL;","modified":"2026-03-20T12:36:45.930365Z","published":"2024-05-20T09:41:53.207Z","related":["ALSA-2024:5928","SUSE-SU-2024:2360-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35962.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/562b7245131f6e9f1d280c8b5a8750f03edfc05c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65acf6e0501ac8880a4f73980d01b5d27648b956"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89242d9584c342cb83311b598d9e6b82572eadf8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c760089aa98289b4b88a7ff5a62dd92845adf223"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35962.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35962"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0f038242b77ddfc505bf4163d4904c1abd2e74d6"},{"fixed":"cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"440e948cf0eff32cfe322dcbca3f2525354b159b"},{"fixed":"97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"18aae2cb87e5faa9c5bd865260ceadac60d5a6c5"},{"fixed":"c760089aa98289b4b88a7ff5a62dd92845adf223"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525"},{"fixed":"89242d9584c342cb83311b598d9e6b82572eadf8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018"},{"fixed":"562b7245131f6e9f1d280c8b5a8750f03edfc05c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0c83842df40f86e529db6842231154772c20edcc"},{"fixed":"65acf6e0501ac8880a4f73980d01b5d27648b956"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-35962.json"}}],"schema_version":"1.7.5"}