{"vulnerability": "CVE-2024-2658", "sightings": [{"uuid": "4ae343c6-55c2-41e3-a424-fd4fdfb7988b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "cef13b08-f6c4-4661-b3e8-d3344c0a6c0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "300cfc2a-f6d9-45f0-a892-1bf505f244cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "5d9a4276-f5bf-47c1-8cd2-14ed95b5199e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "3d543b2a-8c50-47a5-9a9c-9eafe70c78c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/20/linux-kernel-tls-part-1.html", "content": "", "creation_timestamp": "2025-01-19T23:00:00.000000Z"}, {"uuid": "e8c53df0-9d0b-4b99-9875-448bdc617943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2658", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-02", "content": "", "creation_timestamp": "2025-02-06T11:00:00.000000Z"}, {"uuid": "d9432c08-10d9-4c42-bc30-e9cccafe43e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-2658", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113918429685955022", "content": "", "creation_timestamp": "2025-01-30T17:14:49.343974Z"}, {"uuid": "30ac5ebe-60de-4afc-ae07-199229ec417a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2658", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgxydqje2a2b", "content": "", "creation_timestamp": "2025-01-30T17:15:42.830540Z"}, {"uuid": "5bb3ce11-fbde-490e-b7da-65be03375d43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "080af12f-808b-4a1f-ad06-2a7ff0d6b1e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "d6a26c2e-24ef-4201-a4cd-d72f76f6a2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "a4d34b56-1536-4e42-9b49-c463bc91d82e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "83952000-58ef-4435-a6d0-9ca8f232920e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "0a43b1b4-b1e7-44c3-984d-e430461ad168", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "1b94db58-ae36-4d4e-bb3b-6fcf7b565d68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "819970ce-1088-4459-9636-e72cd8020f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "33c2e804-4329-4bf5-922b-0ea047c49880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "2112adb8-a465-4041-89ff-46c037004c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "82c250d9-1019-46f1-a416-c476fb42df8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "961cbc54-2d55-4829-a2a2-0be78cf33e47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "634c9104-069d-4b5f-8d69-adf8b6cb3756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "db3d0973-95ec-4301-94e9-b78b7c3a6e0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "1d38d092-8de6-438f-a727-b9298a408183", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "ee796e80-38f6-4459-8bb7-ebad9e0bdd8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://u1f383.github.io/linux/2025/01/21/linux-kernel-tls-part-2.html", "content": "", "creation_timestamp": "2025-01-20T23:00:00.000000Z"}, {"uuid": "0d1c3c36-ea03-4742-b2d5-a389d5f5d5e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "3b2c2ce9-2a05-4e4a-a946-65c370c716fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-15", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "32760852-c323-41e3-92a8-d4cae30df000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3lwors66m2k2g", "content": "", "creation_timestamp": "2025-08-18T16:07:42.213550Z"}, {"uuid": "0dea4e4d-d81d-4dbc-8cc0-0fc60b57558c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "cf10823b-1c97-45be-a338-e7adcbe06e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "078135b7-7a16-4c32-ae9e-a08a2ebce96c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-26586", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "addd9280-5d73-4c68-b179-0abaf63c7a06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "04a19c77-e387-432f-95df-043adf14d69a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-26589", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "fb2d24b3-4e90-4aad-a0cf-6b0ae564fc94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/12477", "content": "\u200aCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise\n\nhttps://securityonline.info/cve-2024-26581-poc-exploit-released-linux-systems-at-risk-of-root-compromise/", "creation_timestamp": "2024-09-08T17:48:03.000000Z"}, {"uuid": "820baf90-db1e-4719-8402-82d903d76a0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8503", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a[CVE-2024-26581] Vulnerability Checker for BGN Internal\nURL\uff1ahttps://github.com/madfxr/CVE-2024-26581-Checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-13T08:10:18.000000Z"}, {"uuid": "6efc62c5-ff99-4421-8095-adfc51783a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0398/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "82fe0e6c-d32e-465b-b1ca-67fb7cddd5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2658", "type": "seen", "source": "https://t.me/cvedetector/16814", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-2658 - FlexNet Publisher OpenSSL Configuration File Loading Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-2658 \nPublished : Jan. 30, 2025, 5:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : A misconfiguration in lmadmin.exe of FlexNet Publisher versions prior to\u00a02024 R1 (11.19.6.0) allows the OpenSSL configuration file to load from a non-existent directory. An unauthorized, locally authenticated user with low privileges can potentially create the directory and load a specially crafted openssl.conf file leading to the execution of a malicious DLL (Dynamic-Link Library) with elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-30T20:57:53.000000Z"}, {"uuid": "50b8050a-9dad-495a-bde3-9ddcf0557f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/4719", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-27T19:48:09.000000Z"}, {"uuid": "ca30c715-149a-40a5-9706-f9728205650b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/79747", "content": "\ud83d\udee0 CVE-2024-26581 Checker \ud83d\udee0\n\nThis is a script to check your kernel versions to see if you're susceptible to CVE202426581.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"Packet Storm - Tools\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2024-09-19T17:46:18.000000Z"}, {"uuid": "5c82f79e-8322-4325-94c3-153efcc0d15d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/3802", "content": "\ud83d\udea8CVE-2024-26581 Vulnerability Checker for BGN Internal\n\nhttps://darkwebinformer.com/cve-2024-26581-vulnerability-checker-for-bgn-internal/", "creation_timestamp": "2024-09-19T16:54:07.000000Z"}, {"uuid": "fcc6751e-7ab7-44d8-9850-f43d44f9edc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/460", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-26T14:26:02.000000Z"}, {"uuid": "7cbf56f7-473a-4130-a5b7-98ca8073d3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://t.me/arpsyndicate/4077", "content": "#ExploitObserverAlert\n\nCVE-2024-26583\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26583. In the Linux kernel, the following vulnerability has been resolved:  tls: fix race between async notify and socket close  The submitting thread (one which called recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete() so any code past that point risks touching already freed data.  Try to avoid the locking and extra flags altogether. Have the main thread hold an extra reference, this way we can depend solely on the atomic ref counter for synchronization.  Don't futz with reiniting the completion, either, we are now tightly controlling when completion fires.", "creation_timestamp": "2024-02-22T22:28:36.000000Z"}, {"uuid": "2b8b50ec-b3b2-4aa2-8471-58de05e77698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/567", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:00:22.000000Z"}, {"uuid": "7597d808-2553-4f66-9ff5-5554e190d9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://t.me/arpsyndicate/4058", "content": "#ExploitObserverAlert\n\nCVE-2024-26582\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26582. In the Linux kernel, the following vulnerability has been resolved:  net: tls: fix use-after-free with partial reads and async decrypt  tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.", "creation_timestamp": "2024-02-22T21:29:31.000000Z"}, {"uuid": "4bd953c6-4969-494c-9d32-42c45b794d9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://t.me/arpsyndicate/4012", "content": "#ExploitObserverAlert\n\nCVE-2024-26584\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26584. In the Linux kernel, the following vulnerability has been resolved:  net: tls: handle backlogging of crypto requests  Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return  -EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0.  Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.", "creation_timestamp": "2024-02-22T19:21:06.000000Z"}, {"uuid": "a165777a-37cc-437d-9876-0bd3b4f54769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://t.me/arpsyndicate/4040", "content": "#ExploitObserverAlert\n\nCVE-2024-26585\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26585. In the Linux kernel, the following vulnerability has been resolved:  tls: fix race between tx work scheduling and socket close  Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.", "creation_timestamp": "2024-02-22T20:42:39.000000Z"}, {"uuid": "b450c097-21d7-422e-8ade-535c4a6abc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23689", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:42.000000Z"}, {"uuid": "e17fba85-e44c-4ca7-abfb-1cd736f725e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/arpsyndicate/3765", "content": "#ExploitObserverAlert\n\nCVE-2024-26581\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26581. In the Linux kernel, the following vulnerability has been resolved:  netfilter: nft_set_rbtree: skip end interval element from gc  rbtree lazy gc on insert might collect an end interval element that has been just added in this transactions, skip end interval elements that are not yet active.", "creation_timestamp": "2024-02-21T13:26:19.000000Z"}, {"uuid": "bb7a9441-9f2f-43fe-8ab1-162fd903e999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://t.me/ctinow/189742", "content": "https://ift.tt/AqfNwvV\nCVE-2024-26583", "creation_timestamp": "2024-02-21T16:31:30.000000Z"}, {"uuid": "ea8f7dd4-0feb-49d9-a8f6-2c4f204d0c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26580", "type": "seen", "source": "https://t.me/ctinow/201321", "content": "https://ift.tt/v4eOf5K\nCVE-2024-26580", "creation_timestamp": "2024-03-06T13:31:27.000000Z"}, {"uuid": "0be0e299-f009-459d-ac6b-6eeba9312ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188516", "content": "https://ift.tt/aBsEQxV\nCVE-2024-26581", "creation_timestamp": "2024-02-20T14:22:02.000000Z"}, {"uuid": "8de192cd-dd33-4b28-8ebd-af7da398555c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26586", "type": "seen", "source": "https://t.me/ctinow/191795", "content": "https://ift.tt/qCRBFik\nCVE-2024-26586", "creation_timestamp": "2024-02-23T15:11:29.000000Z"}, {"uuid": "42c915be-eddb-465e-ab82-f5a81c52a330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://t.me/ctinow/189741", "content": "https://ift.tt/9Nd20rI\nCVE-2024-26582", "creation_timestamp": "2024-02-21T16:31:29.000000Z"}, {"uuid": "21465786-deee-4ef8-8658-97578973282c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://t.me/ctinow/189737", "content": "https://ift.tt/nxq4LgW\nCVE-2024-26585", "creation_timestamp": "2024-02-21T16:31:26.000000Z"}, {"uuid": "487b4adc-2a38-4953-8567-237145cb8500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://t.me/ctinow/189736", "content": "https://ift.tt/4gDaCPl\nCVE-2024-26584", "creation_timestamp": "2024-02-21T16:31:24.000000Z"}, {"uuid": "e25198a2-b440-4a6e-a7fb-3b36fcfe161d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://t.me/ctinow/189735", "content": "https://ift.tt/AqfNwvV\nCVE-2024-26583", "creation_timestamp": "2024-02-21T16:31:23.000000Z"}, {"uuid": "90285207-5f2d-41bf-ba10-66e1a2643f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://t.me/ctinow/189734", "content": "https://ift.tt/9Nd20rI\nCVE-2024-26582", "creation_timestamp": "2024-02-21T16:31:22.000000Z"}, {"uuid": "2c673864-14e3-44dc-8bc6-25c7cfc810a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://t.me/ctinow/189744", "content": "https://ift.tt/nxq4LgW\nCVE-2024-26585", "creation_timestamp": "2024-02-21T16:31:32.000000Z"}, {"uuid": "48ca846f-fe9f-4db3-9269-40161faf0ad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://t.me/ctinow/189743", "content": "https://ift.tt/4gDaCPl\nCVE-2024-26584", "creation_timestamp": "2024-02-21T16:31:31.000000Z"}, {"uuid": "08b7c792-9de5-4bf1-a747-ee7d9c5ca67b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188526", "content": "https://ift.tt/aBsEQxV\nCVE-2024-26581", "creation_timestamp": "2024-02-20T14:26:23.000000Z"}, {"uuid": "200d8259-11f4-4ceb-a0f7-2f3c34220ce9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "seen", "source": "https://t.me/ctinow/188928", "content": "https://ift.tt/ourK5HR\nCVE-2024-26581", "creation_timestamp": "2024-02-20T21:31:21.000000Z"}, {"uuid": "dfabe054-f904-4ea7-b200-fdd4cb1df696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26587", "type": "seen", "source": "https://t.me/ctinow/191794", "content": "https://ift.tt/2APtiUE\nCVE-2024-26587", "creation_timestamp": "2024-02-23T15:11:28.000000Z"}, {"uuid": "e65e312b-ae85-406c-8c4f-438fbdedb9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26589", "type": "seen", "source": "https://t.me/ctinow/191793", "content": "https://ift.tt/kysjgod\nCVE-2024-26589", "creation_timestamp": "2024-02-23T15:11:27.000000Z"}, {"uuid": "c570bbbe-982f-48ca-b879-6188e778ee03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26586", "type": "seen", "source": "https://t.me/ctinow/191009", "content": "https://ift.tt/Rtg5KLu\nCVE-2024-26586", "creation_timestamp": "2024-02-22T18:53:39.000000Z"}, {"uuid": "286d2372-e0d2-4978-874e-1a0ed89a1a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26583", "type": "seen", "source": "https://t.me/ctinow/190856", "content": "https://ift.tt/HvDpz70\nCVE-2024-26583", "creation_timestamp": "2024-02-22T16:11:24.000000Z"}, {"uuid": "10fdf2e3-cd50-4b96-9b54-ca5c8a13b1a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://t.me/ctinow/190855", "content": "https://ift.tt/rVb1ZXQ\nCVE-2024-26584", "creation_timestamp": "2024-02-22T16:11:23.000000Z"}, {"uuid": "b8b75486-e1c7-4221-8752-6a346cb0f5ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26585", "type": "seen", "source": "https://t.me/ctinow/190854", "content": "https://ift.tt/VdoMGx7\nCVE-2024-26585", "creation_timestamp": "2024-02-22T16:11:22.000000Z"}, {"uuid": "7f9e1166-c22c-423a-8cd1-61f4ab43f7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26589", "type": "seen", "source": "https://t.me/ctinow/191012", "content": "https://ift.tt/N4YE12k\nCVE-2024-26589", "creation_timestamp": "2024-02-22T18:53:44.000000Z"}, {"uuid": "3c69784b-2018-4468-beb5-1201c9b9228b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26588", "type": "seen", "source": "https://t.me/ctinow/191011", "content": "https://ift.tt/8IlJQxH\nCVE-2024-26588", "creation_timestamp": "2024-02-22T18:53:44.000000Z"}, {"uuid": "8d0c07fa-663f-47a4-a8d7-d0e2c236ad1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26587", "type": "seen", "source": "https://t.me/ctinow/191010", "content": "https://ift.tt/4imsfMo\nCVE-2024-26587", "creation_timestamp": "2024-02-22T18:53:43.000000Z"}, {"uuid": "bf6a11ed-17f5-4f86-862a-5f208b03a357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "seen", "source": "https://t.me/ctinow/190857", "content": "https://ift.tt/P7MZXcx\nCVE-2024-26582", "creation_timestamp": "2024-02-22T16:11:25.000000Z"}, {"uuid": "2c6f528e-9502-4493-9a89-d159f7801b48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/210", "content": "\u26a1\ufe0fCVE-2024-26581 PoC Exploit Released: Linux Systems at Risk of Root Compromise.\n\n#CyberBulletin", "creation_timestamp": "2024-09-06T11:36:44.000000Z"}, {"uuid": "b80c5033-f434-476a-9fbe-340412a005ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26582", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10044", "content": "#exploit\n1. CVE-2024-1346:\nWeak MySQL database root password in LaborOfficeFree\nhttps://github.com/PeterGabaldon/CVE-2024-1346\n\n2. A modern dashboard exploit for MS Xbox\nhttps://github.com/XboxDev/endgame-exploit\n\n3. CVE-2024-26582:\nLinux Kernel TLS Vulnerability\nhttps://lore.kernel.org/linux-cve-announce/2024022139-spruce-prelude-c358@gregkh", "creation_timestamp": "2024-02-26T12:44:22.000000Z"}, {"uuid": "e7a40f02-c150-44b1-8b50-8d2ee55848d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26581", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11194", "content": "#exploit\n#Kernel_Security\n1. A step-by-step guide to writing an iOS kernel exploit\nhttps://alfiecg.uk/2024/09/24/Kernel-exploit.html\n\n2. CVE-2024-26581:\nLinux Kernel Netfilter Privilege Escalation\nhttps://github.com/google/security-research/tree/master/pocs/linux/kernelctf/CVE-2024-26581_lts_cos_mitigation", "creation_timestamp": "2024-09-26T11:27:20.000000Z"}, {"uuid": "b61a32c4-8e9e-4854-af6e-01f00d40dfbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-26584", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/suse-linux-kernel-multiple-vulnerabilities_20260506", "content": "", "creation_timestamp": "2026-05-05T18:00:00.000000Z"}]}