CVE-2024-35896
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-35896 is a vulnerability in the Linux kernel's netfilter component that affects the validation of user input for expected length. The vulnerability was discovered when multiple syzbot reports showed old bugs exposed by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc in cgroup/{s,g}etsockopt"). The issue was identified in May 2024 and affects Linux kernel versions from 2.6.12 up to versions before 5.10.215, 5.15.154, 6.1.85, 6.6.26, and 6.8.5 (NVD).

Technical details

The vulnerability stems from improper validation of the setsockopt() @optlen argument before copying data. This results in a slab-out-of-bounds condition in the netfilter component, specifically in the copyfromsockptroffset and copyfrom_sockptr functions. The issue manifests as a KASAN (Kernel Address Sanitizer) error when attempting to read 96 bytes at an invalid address, indicating a buffer overflow condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H (NVD).

Impact

The vulnerability can lead to a slab-out-of-bounds read in the Linux kernel's netfilter component. This could potentially result in information disclosure and system crashes, affecting the confidentiality and availability of the system. The high CVSS score indicates significant potential impact, particularly in terms of confidentiality and availability breaches (NVD).

Mitigation and workarounds

The vulnerability has been fixed in the Linux kernel through patches that validate user input for expected length. The fix has been backported to multiple stable kernel versions. Users are advised to update their systems to patched versions: Linux kernel versions 5.10.215, 5.15.154, 6.1.85, 6.6.26, or 6.8.5 and later. The fix involves adding proper length validation before copying data in the netfilter component (Kernel Patch).

Community reactions

The vulnerability has been acknowledged by major Linux distributions and security teams. Red Hat has included the fix in their security advisories, and Debian has addressed it in their LTS security updates. The fix has been reviewed and approved by kernel maintainers, including Pablo Neira Ayuso (Debian LTS, Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management