目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2024-0646— Linux kernel 安全漏洞

CVSS 7.0 · High EPSS 0.02% · P5
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2024-0646の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination
ソース: NVD (National Vulnerability Database)
脆弱性説明
An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
跨界内存写
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于存在越界内存写入问题,允许本地用户导致系统崩溃或提升权限。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
Red HatRed Hat Enterprise Linux 8 0:4.18.0-513.18.1.rt7.320.el8_9 ~ * cpe:/a:redhat:enterprise_linux:8::realtime
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8::baseos
Red HatRed Hat Enterprise Linux 8 0:4.18.0-513.18.1.el8_9 ~ * cpe:/a:redhat:enterprise_linux:8::crb
Red HatRed Hat Enterprise Linux 8.2 Advanced Update Support 0:4.18.0-193.128.1.el8_2 ~ * cpe:/o:redhat:rhel_tus:8.2::baseos
Red HatRed Hat Enterprise Linux 8.2 Telecommunications Update Service 0:4.18.0-193.128.1.rt13.179.el8_2 ~ * cpe:/a:redhat:rhel_tus:8.2::realtime
Red HatRed Hat Enterprise Linux 8.2 Telecommunications Update Service 0:4.18.0-193.128.1.el8_2 ~ * cpe:/o:redhat:rhel_tus:8.2::baseos
Red HatRed Hat Enterprise Linux 8.2 Update Services for SAP Solutions 0:4.18.0-193.128.1.el8_2 ~ * cpe:/o:redhat:rhel_tus:8.2::baseos
Red HatRed Hat Enterprise Linux 8.2 Update Services for SAP Solutions-cpe:/o:redhat:rhel_e4s:8.2::baseos
Red HatRed Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support 0:4.18.0-305.125.1.el8_4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.4 Telecommunications Update Service 0:4.18.0-305.125.1.rt7.201.el8_4 ~ * cpe:/a:redhat:rhel_tus:8.4::realtime
Red HatRed Hat Enterprise Linux 8.4 Telecommunications Update Service 0:4.18.0-305.125.1.el8_4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.4 Update Services for SAP Solutions 0:4.18.0-305.125.1.el8_4 ~ * cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.4 Update Services for SAP Solutions-cpe:/o:redhat:rhel_e4s:8.4::baseos
Red HatRed Hat Enterprise Linux 8.6 Extended Update Support 0:4.18.0-372.91.1.el8_6 ~ * cpe:/o:redhat:rhev_hypervisor:4.4::el8
Red HatRed Hat Enterprise Linux 8.6 Extended Update Support-cpe:/o:redhat:rhel_eus:8.6::baseos
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support-cpe:/o:redhat:rhel_eus:8.8::baseos
Red HatRed Hat Enterprise Linux 8.8 Extended Update Support 0:4.18.0-477.51.1.el8_8 ~ * cpe:/o:redhat:rhel_eus:8.8::baseos
Red HatRed Hat Enterprise Linux 9 0:5.14.0-362.24.1.el9_3 ~ * cpe:/a:redhat:enterprise_linux:9::crb
Red HatRed Hat Enterprise Linux 9 0:5.14.0-362.24.1.el9_3 ~ * cpe:/a:redhat:enterprise_linux:9::crb
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9::baseos
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 0:5.14.0-70.93.2.el9_0 ~ * cpe:/o:redhat:rhel_eus:9.0::baseos
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 0:5.14.0-70.93.1.rt21.165.el9_0 ~ * cpe:/a:redhat:rhel_eus:9.0::realtime
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support-cpe:/o:redhat:rhel_eus:9.0::baseos
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 0:5.14.0-284.52.1.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::appstream
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 0:5.14.0-284.52.1.rt14.337.el9_2 ~ * cpe:/a:redhat:rhel_eus:9.2::nfv
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support-cpe:/o:redhat:rhel_eus:9.2::baseos
Red HatRed Hat Virtualization 4 for Red Hat Enterprise Linux 8 0:4.18.0-372.91.1.el8_6 ~ * cpe:/o:redhat:rhev_hypervisor:4.4::el8
Red HatRHOL-5.8-RHEL-9 v5.8.6-22 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-11 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v6.8.1-407 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-19 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v1.0.0-479 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-7 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v0.4.0-247 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-5 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v1.1.0-227 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.1-470 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v2.9.6-14 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-2 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-24 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v5.8.6-10 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v0.1.0-525 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v0.1.0-224 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRHOL-5.8-RHEL-9 v0.28.1-56 ~ * cpe:/a:redhat:logging:5.8::el9
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9

II. CVE-2024-0646の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2024-0646のインテリジェンス情報

登录查看更多情报信息。

IV. 関連脆弱性

V. CVE-2024-0646へのコメント

まだコメントはありません


コメントを残す