Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0646: Out-of-bounds Write

0
High
VulnerabilityCVE-2024-0646cvecve-2024-0646
Published: Wed Jan 17 2024 (01/17/2024, 15:16:45 UTC)
Source: CVE Database V5

Description

An out-of-bounds memory write flaw was found in the Linux kernel’s Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.

AI-Powered Analysis

AILast updated: 11/06/2025, 21:51:24 UTC

Technical Analysis

CVE-2024-0646 is an out-of-bounds write vulnerability discovered in the Linux kernel's Transport Layer Security (TLS) subsystem. The flaw arises specifically when a local user calls the splice system call with a kernel TLS (ktls) socket as the destination. The splice function is used to move data between file descriptors efficiently without copying between kernel and user space. However, in this scenario, improper bounds checking leads to an out-of-bounds memory write, which can corrupt kernel memory. This memory corruption can cause a denial of service (system crash) or potentially allow a local attacker to escalate privileges by overwriting critical kernel data structures. The vulnerability requires local access with low privileges (PR:L), no user interaction (UI:N), and has a high attack complexity (AC:H), meaning exploitation is non-trivial and requires specific conditions. The CVSS v3.1 base score is 7.0, reflecting high impact on confidentiality, integrity, and availability (all high). No public exploits are known at this time, but the flaw affects Linux kernel versions that implement ktls and the splice system call. The vulnerability was published on January 17, 2024, and assigned by Red Hat. Since ktls is used to offload TLS processing to the kernel for performance improvements, systems utilizing ktls for secure communications are particularly at risk. This vulnerability is critical for environments where local user access is possible, such as multi-user servers or shared hosting environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to Linux-based infrastructure, especially servers handling secure communications via ktls. Successful exploitation can lead to system crashes, causing denial of service, or privilege escalation, which could allow attackers to gain root-level access. This compromises confidentiality, integrity, and availability of critical systems and data. Organizations in sectors such as finance, telecommunications, government, and critical infrastructure that rely heavily on Linux servers are particularly vulnerable. The impact is exacerbated in multi-tenant environments where local user access is granted, such as cloud service providers or shared hosting platforms. Disruption or compromise of these systems could lead to operational downtime, data breaches, and regulatory non-compliance under GDPR and other European data protection laws. The lack of known exploits currently provides a window for proactive mitigation, but the potential for future exploitation remains high.

Mitigation Recommendations

1. Apply official Linux kernel patches addressing CVE-2024-0646 as soon as they become available from trusted vendors or distributions. 2. Restrict local user access to systems running vulnerable kernel versions, especially limiting untrusted or low-privileged users. 3. Disable ktls functionality if not required, or configure systems to avoid using ktls sockets with splice until patched. 4. Implement strict access controls and monitoring to detect unusual system calls or kernel crashes indicative of exploitation attempts. 5. Employ kernel hardening techniques such as SELinux or AppArmor to limit the impact of potential privilege escalations. 6. Regularly audit and update Linux kernel versions to ensure timely application of security fixes. 7. For multi-tenant environments, isolate user sessions and minimize local access to reduce attack surface. 8. Monitor security advisories from Linux distributions and Red Hat for updates and exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-17T13:11:12.669Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a5cfba0e608b4f98d821

Added to database: 10/9/2025, 12:08:47 PM

Last enriched: 11/6/2025, 9:51:24 PM

Last updated: 12/3/2025, 12:13:04 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats