CVE-2024-38627 — In the Linux kernel, the following vulnerability has been resolved:
In the Linux kernel, the following vulnerability has been resolved:
Published
2024-06-21T10:18:18.912Z
Last modified
2025-11-04T17:21:50.394Z
01What is this vulnerability?
In the Linux kernel, the following vulnerability has been resolved:
02Affected products
| Vendor | Product | Versions |
|---|
| Linux | Linux | 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, 389b6699a2aa0b457aa69986e9ddf39f3b4030fd, b0351a51ffda593b2b1b35dd0c00a73505edb256 |
| Linux | Linux | 4.7, 0, 4.19.316, 5.4.278, 5.10.219, 5.15.161, 6.1.93, 6.6.33, 6.9.4, 6.10 |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2024-06-21T10:18:18.912Z
- Last modified: 2025-11-04T17:21:50.394Z
09References
- git.kernel.org — https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931
- git.kernel.org — https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695
- git.kernel.org — https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b
- git.kernel.org — https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36
- git.kernel.org — https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247
- git.kernel.org — https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20
- git.kernel.org — https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be
- git.kernel.org — https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →