Linux Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

Type

The moderation team is working with the threat intelligence team to categorize software that is affected by security vulnerabilities. This helps to illustrate the assignment of these categories to determine the most affected software types.

Product

Linux Kernel3974
Linux Foundation Xen122
Linux Foundation ONOS8
Linux Foundation cups-filters5
Linux Foundation xen5

Grouping vulnerabilities by products helps to get an overview. This makes it possible to determine an homogeneous landscape or the most important hotspots in heterogeneous landscapes.

Remediation

Official Fix3662
Temporary Fix0
Workaround15
Unavailable13
Not Defined464

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

High20
Functional3
Proof-of-Concept545
Unproven229
Not Defined3357

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical61
Local1958
Adjacent1200
Network935

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High56
Low2264
None1834

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required76
None4078

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤20
≤367
≤4511
≤5600
≤61177
≤7942
≤8503
≤9230
≤10124

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤20
≤384
≤4524
≤5701
≤61418
≤7725
≤8442
≤9202
≤1058

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤3103
≤4768
≤5412
≤61370
≤7629
≤8515
≤9200
≤10156

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤39
≤427
≤5149
≤6499
≤7193
≤8538
≤934
≤1060

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤35
≤413
≤534
≤657
≤750
≤877
≤92
≤102

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤61
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k33
<2k81
<5k1010
<10k1906
<25k929
<50k187
<100k7
≥100k1

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k2931
<2k580
<5k430
<10k157
<25k56
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Products (32): Board-TNK (1), CPU (1), DeepOfix (1), Enterprise Server (1), Heartbeat (2), Jami (2), Kernel (3974), LibThai (1), MySQL (1), MySQLDatabase Admin Tool (1), News-TNK (1), Nslookup (1), OCF Resource Agents (1), ONOS (8), ONOS SDN Controller (1), Sblim-sfcb (2), Traceroute Script (1), UMIP (2), XEN (1), Xen (122), Xen Elf Parser (3), Xreader (2), cups-filters (5), foomatic (1), heartbeat (2), libvchan (1), nfs-utils (3), php Download Manager (1), php User Base (1), sblim-sfcb (4), xen (5), zephyr (1)

Link to Vendor Website: https://www.kernel.org/

PublishedBaseTempVulnerabilityProdExpRemCTIEPSSCVE
04/08/20243.53.4Linux Kernel IPC Response out-of-boundsOperating SystemNot DefinedOfficial Fix0.390.00000CVE-2024-26811
04/05/20245.75.5Linux Kernel request_irq null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.040.00045CVE-2024-26813
04/05/20245.55.3Linux Kernel request_irq Privilege EscalationOperating SystemNot DefinedOfficial Fix0.020.00045CVE-2024-27437
04/05/20245.55.3Linux Kernel INTx eventfd_signal Privilege EscalationOperating SystemNot DefinedOfficial Fix0.390.00045CVE-2024-26812
04/05/20245.75.5Linux Kernel request_irq infinite loopOperating SystemNot DefinedOfficial Fix0.050.00045CVE-2024-26814
04/05/20244.64.4Linux Kernel is_intx Privilege EscalationOperating SystemNot DefinedOfficial Fix0.020.00045CVE-2024-26810
04/04/20245.55.3Linux Kernel iov_iter.c netlink_to_full_skb uninitialized pointerOperating SystemNot DefinedOfficial Fix0.030.00044CVE-2024-26805
04/04/20245.55.3Linux Kernel veth_disable_xdp uninitialized pointerOperating SystemNot DefinedOfficial Fix0.900.00045CVE-2024-26803
04/04/20245.55.3Linux Kernel cadence-qspi dev_get_drvdata memory corruptionOperating SystemNot DefinedOfficial Fix0.620.00045CVE-2024-26807
04/04/20245.55.3Linux Kernel mptcp double freeOperating SystemNot DefinedOfficial Fix0.780.00044CVE-2024-26782
04/04/20245.55.3Linux Kernel vmscan wakeup_kswapd memory corruptionOperating SystemNot DefinedOfficial Fix0.110.00045CVE-2024-26783
04/04/20245.55.3Linux Kernel nft_chain_filter Privilege EscalationOperating SystemNot DefinedOfficial Fix0.030.00044CVE-2024-26808
04/04/20244.64.4Linux Kernel Bluetooth hci_error_reset use after freeOperating SystemNot DefinedOfficial Fix1.070.00044CVE-2024-26801
04/04/20245.55.3Linux Kernel tls crypto_aead_decrypt use after freeOperating SystemNot DefinedOfficial Fix0.020.00045CVE-2024-26800
04/04/20245.55.3Linux Kernel qcom lpass-cdc-dma.c __lpass_get_dmactl_handle uninitialized pointerOperating SystemNot DefinedOfficial Fix0.000.00045CVE-2024-26799
04/04/20244.64.4Linux Kernel fsl-qdma initializationOperating SystemNot DefinedOfficial Fix0.820.00044CVE-2024-26788
04/04/20245.55.3Linux Kernel debug.c mmci_cmd_irq memory corruptionOperating SystemNot DefinedOfficial Fix0.000.00044CVE-2024-26787
04/04/20245.55.3Linux Kernel io_pagetable.c iopt_add_access memory corruptionOperating SystemNot DefinedOfficial Fix0.030.00045CVE-2024-26786
04/04/20245.55.3Linux Kernel iommufd_access_change_ioas memory corruptionOperating SystemNot DefinedOfficial Fix0.030.00043CVE-2024-26785
04/04/20244.84.6Linux Kernel pmdomain null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.230.00043CVE-2024-26784
04/04/20243.53.4Linux Kernel vmemmap pfn_to_page out-of-boundsOperating SystemNot DefinedOfficial Fix0.830.00044CVE-2024-26795
04/04/20245.55.3Linux Kernel nft_set_pipapo Privilege EscalationOperating SystemNot DefinedOfficial Fix0.300.00044CVE-2024-26809
04/04/20245.75.5Linux Kernel cadence-qspi runtime_suspend deadlockOperating SystemNot DefinedOfficial Fix0.300.00043CVE-2024-26806
04/04/20245.55.3Linux Kernel ip_tunnel skb_network_offset use after freeOperating SystemNot DefinedOfficial Fix0.000.00044CVE-2024-26804
04/04/20244.84.6Linux Kernel stmmac destroy_workqueue null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.430.00045CVE-2024-26802
04/04/20244.84.6Linux Kernel fbcon_do_set_font allocation of resourcesOperating SystemNot DefinedOfficial Fix0.150.00045CVE-2024-26798
04/04/20245.55.3Linux Kernel Error Message map_hw_resources buffer overflowOperating SystemNot DefinedOfficial Fix0.440.00043CVE-2024-26797
04/04/20244.84.6Linux Kernel perf ctr_get_width null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.110.00045CVE-2024-26796
04/04/20244.84.6Linux Kernel btrfs_finish_one_ordered deadlockOperating SystemNot DefinedOfficial Fix0.110.00045CVE-2024-26794
04/04/20244.64.4Linux Kernel gtp_newlink use after freeOperating SystemNot DefinedOfficial Fix0.030.00044CVE-2024-26793
04/04/20245.55.3Linux Kernel btrfs getname_kernel initializationOperating SystemNot DefinedOfficial Fix0.330.00044CVE-2024-26791
04/04/20244.34.1Linux Kernel dmaengine deadlockOperating SystemNot DefinedOfficial Fix0.040.00044CVE-2024-26790
04/04/20243.53.4Linux Kernel neonbs out-of-boundsOperating SystemNot DefinedOfficial Fix0.360.00045CVE-2024-26789
04/04/20243.53.4Linux Kernel mptcp deadlockOperating SystemNot DefinedOfficial Fix0.080.00044CVE-2024-26781
04/04/20242.62.5Linux Kernel Kernel Memory usercopy.c kmem_cache_create information disclosureOperating SystemNot DefinedOfficial Fix0.080.00045CVE-2024-26746
04/04/20242.62.5Linux Kernel af_unix list_for_each_entry_safe iterationOperating SystemNot DefinedOfficial Fix0.490.00045CVE-2024-26780
04/04/20242.62.5Linux Kernel af_unix __unix_gc denial of serviceOperating SystemNot DefinedOfficial Fix0.390.00045CVE-2024-26750
04/04/20245.75.5Linux Kernel pci_dma_bus_setup_pSeriesLP null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.080.00045CVE-2024-26745
04/04/20244.64.4Linux Kernel btrfs Filesystem ioctl.c create_snapshot double freeOperating SystemNot DefinedOfficial Fix0.080.00045CVE-2024-26792
04/03/20245.75.5Linux Kernel aoe set_capacity deadlockOperating SystemNot DefinedOfficial Fix0.120.00045CVE-2024-26775
04/03/20245.55.3Linux Kernel dm-crypt memory corruptionOperating SystemNot DefinedOfficial Fix0.020.00044CVE-2024-26763
04/03/20245.55.3Linux Kernel LoongArch stack-based overflowOperating SystemNot DefinedOfficial Fix0.020.00045CVE-2024-26768
04/03/20243.53.4Linux Kernel cxl denial of serviceOperating SystemNot DefinedOfficial Fix0.050.00045CVE-2024-26761
04/03/20244.84.6Linux Kernel hisi-sfc-v3xx null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.040.00044CVE-2024-26776
04/03/20245.55.3Linux Kernel ext4 mb_update_avg_fragment_size divide by zeroOperating SystemNot DefinedOfficial Fix0.000.00045CVE-2024-26774
04/03/20245.55.3Linux Kernel ext4_mb_try_best_found memory corruptionOperating SystemNot DefinedOfficial Fix0.000.00044CVE-2024-26773
04/03/20245.55.3Linux Kernel ext4_mb_find_by_goal memory corruptionOperating SystemNot DefinedOfficial Fix0.000.00044CVE-2024-26772
04/03/20245.75.5Linux Kernel dmaengine devm_kasprintf null pointer dereferenceOperating SystemNot DefinedOfficial Fix0.000.00044CVE-2024-26771
04/03/20245.75.5Linux Kernel nvmet-fc nvmet_wq deadlockOperating SystemNot DefinedOfficial Fix0.000.00045CVE-2024-26769
04/03/20244.84.6Linux Kernel mac80211 drv_tx race conditionOperating SystemNot DefinedOfficial Fix0.400.00044CVE-2024-26779

4104 more entries are not shown

Interested in the pricing of exploits?

See the underground prices here!