🔐 CVE Alert

CVE-2024-0646

HIGH 7.0

Kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination

CVSS Score
7.0
EPSS Score
0.0%
EPSS Percentile
0th

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CWE CWE-787
Published Jan 17, 2024
Last Updated Nov 6, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / RHOL-5.8-RHEL-9
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0723 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0724 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0725 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0850 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0851 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0876 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0881 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:0897 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1248 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1250 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1251 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1253 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1268 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1269 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1278 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1306 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1367 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1368 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1377 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1382 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1404 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2094 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-0646 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2253908 git.kernel.org: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html