
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-35896 is a vulnerability in the Linux kernel's netfilter component that affects the validation of user input for expected length. The vulnerability was discovered when multiple syzbot reports showed old bugs exposed by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc in cgroup/{s,g}etsockopt"). The issue was identified in May 2024 and affects Linux kernel versions from 2.6.12 up to versions before 5.10.215, 5.15.154, 6.1.85, 6.6.26, and 6.8.5 (NVD).
The vulnerability stems from improper validation of the setsockopt() @optlen argument before copying data. This results in a slab-out-of-bounds condition in the netfilter component, specifically in the copyfromsockptroffset and copyfrom_sockptr functions. The issue manifests as a KASAN (Kernel Address Sanitizer) error when attempting to read 96 bytes at an invalid address, indicating a buffer overflow condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H (NVD).
The vulnerability can lead to a slab-out-of-bounds read in the Linux kernel's netfilter component. This could potentially result in information disclosure and system crashes, affecting the confidentiality and availability of the system. The high CVSS score indicates significant potential impact, particularly in terms of confidentiality and availability breaches (NVD).
The vulnerability has been fixed in the Linux kernel through patches that validate user input for expected length. The fix has been backported to multiple stable kernel versions. Users are advised to update their systems to patched versions: Linux kernel versions 5.10.215, 5.15.154, 6.1.85, 6.6.26, or 6.8.5 and later. The fix involves adding proper length validation before copying data in the netfilter component (Kernel Patch).
The vulnerability has been acknowledged by major Linux distributions and security teams. Red Hat has included the fix in their security advisories, and Debian has addressed it in their LTS security updates. The fix has been reviewed and approved by kernel maintainers, including Pablo Neira Ayuso (Debian LTS, Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”