First published: Sun Dec 10 2023(Updated: )
A flaw in the Linux Kernel found. When splice() is called with a ktls socket as destination, the ktls code fails to update the internal "curr"/"copybreak" accounting that tracks which parts of the plaintext scatter-gather buffer (`struct sk_msg_sg`) are unused writable memory. This can cause subsequent writes to the socket to overwrite the contents of spliced pages, including pages from files to which the caller is not supposed to have write access. Reference: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.7 | 6.7 |
IBM Security Verify Governance, Identity Manager software component | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager virtual appliance component | <=ISVG 10.0.2 | |
Linux Kernel | >=4.20<5.4.267 | |
Linux Kernel | >=5.5<5.10.208 | |
Linux Kernel | >=5.11<5.15.147 | |
Linux Kernel | >=5.16<6.1.69 | |
Linux Kernel | >=6.2<6.6.7 | |
Linux Kernel | =6.7-rc1 | |
Linux Kernel | =6.7-rc2 | |
Linux Kernel | =6.7-rc3 | |
Linux Kernel | =6.7-rc4 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-0646 is classified as a significant vulnerability in the Linux Kernel affecting ktls sockets.
CVE-2024-0646 affects various versions of the Linux Kernel, Red Hat Enterprise Linux, and specific IBM products.
To fix CVE-2024-0646, update your Linux Kernel to versions 6.7 or apply patches to vulnerable systems.
CVE-2024-0646 may lead to improper access control on ktls sockets, potentially allowing unauthorized access to memory.
CVE-2024-0646 was publicly disclosed in 2024.