Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-0646

Опубликовано: 07 дек. 2023
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Меры по смягчению последствий

To mitigate this issue, prevent module tls from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2024:088120.02.2024
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2024:087620.02.2024
Red Hat Enterprise Linux 8kernelFixedRHSA-2024:089720.02.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2024:126812.03.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update Servicekernel-rtFixedRHSA-2024:126912.03.2024
Red Hat Enterprise Linux 8.2 Telecommunications Update ServicekernelFixedRHSA-2024:126812.03.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2253908kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination

EPSS

Процентиль: 3%
0.00018
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 1 года назад

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7
nvd
больше 1 года назад

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7
debian
больше 1 года назад

An out-of-bounds memory write flaw was found in the Linux kernel\u2019 ...

CVSS3: 7
github
больше 1 года назад

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

EPSS

Процентиль: 3%
0.00018
Низкий

7 High

CVSS3