Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-0565

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-15 Jan, 2024 | 20:02
Updated At-06 Nov, 2025 | 19:54
Rejected At-
Credits

Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:15 Jan, 2024 | 20:02
Updated At:06 Nov, 2025 | 19:54
Rejected At:
▼CVE Numbering Authority (CNA)
Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

Affected Products
Collection URL
https://git.kernel.org/pub/scm/linux/kernel
Package Name
kernel
Default Status
unaffected
Versions
Affected
  • From 0 before 6.7-rc6 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel-rt
CPEs
  • cpe:/a:redhat:enterprise_linux:8::nfv
  • cpe:/a:redhat:enterprise_linux:8::realtime
Default Status
affected
Versions
Unaffected
  • From 0:4.18.0-513.24.1.rt7.326.el8_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:enterprise_linux:8::crb
  • cpe:/o:redhat:enterprise_linux:8::baseos
Default Status
affected
Versions
Unaffected
  • From 0:4.18.0-513.24.1.el8_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:rhel_eus:8.6::crb
  • cpe:/o:redhat:rhev_hypervisor:4.4::el8
  • cpe:/o:redhat:rhel_eus:8.6::baseos
Default Status
affected
Versions
Unaffected
  • From 0:4.18.0-372.95.1.el8_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:rhel_eus:8.8::crb
  • cpe:/o:redhat:rhel_eus:8.8::baseos
Default Status
affected
Versions
Unaffected
  • From 0:4.18.0-477.51.1.el8_8 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:enterprise_linux:9::nfv
  • cpe:/a:redhat:enterprise_linux:9::appstream
  • cpe:/a:redhat:enterprise_linux:9::realtime
  • cpe:/a:redhat:enterprise_linux:9::crb
  • cpe:/o:redhat:enterprise_linux:9::baseos
Default Status
affected
Versions
Unaffected
  • From 0:5.14.0-427.13.1.el9_4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:enterprise_linux:9::nfv
  • cpe:/a:redhat:enterprise_linux:9::appstream
  • cpe:/a:redhat:enterprise_linux:9::realtime
  • cpe:/a:redhat:enterprise_linux:9::crb
  • cpe:/o:redhat:enterprise_linux:9::baseos
Default Status
affected
Versions
Unaffected
  • From 0:5.14.0-427.13.1.el9_4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::crb
  • cpe:/o:redhat:rhel_eus:9.2::baseos
  • cpe:/a:redhat:rhel_eus:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:5.14.0-284.59.1.el9_2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel-rt
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::nfv
  • cpe:/a:redhat:rhel_eus:9.2::realtime
Default Status
affected
Versions
Unaffected
  • From 0:5.14.0-284.59.1.rt14.344.el9_2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/a:redhat:rhel_eus:8.6::crb
  • cpe:/o:redhat:rhev_hypervisor:4.4::el8
  • cpe:/o:redhat:rhel_eus:8.6::baseos
Default Status
affected
Versions
Unaffected
  • From 0:4.18.0-372.95.1.el8_6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/cluster-logging-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-16 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/cluster-logging-rhel8-operator
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-7 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch6-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v6.8.1-408 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-19 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-proxy-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v1.0.0-480 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/elasticsearch-rhel8-operator
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/eventrouter-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v0.4.0-248 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/fluentd-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v1.14.6-215 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/kibana6-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v6.8.1-431 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/log-file-metric-exporter-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v1.1.0-228 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-curator5-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.8.1-471 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-loki-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v2.9.6-15 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/logging-view-plugin-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-3 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/loki-operator-bundle
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-27 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/loki-rhel8-operator
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v5.7.13-12 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/lokistack-gateway-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v0.1.0-527 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/opa-openshift-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v0.1.0-225 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
RHOL-5.7-RHEL-8
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
openshift-logging/vector-rhel8
CPEs
  • cpe:/a:redhat:logging:5.7::el8
Default Status
affected
Versions
Unaffected
  • From v0.28.1-57 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel-rt
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
kernel-rt
CPEs
  • cpe:/o:redhat:enterprise_linux:9
Default Status
affected
Problem Types
TypeCWE IDDescription
CWECWE-191Integer Underflow (Wrap or Wraparound)
Type: CWE
CWE ID: CWE-191
Description: Integer Underflow (Wrap or Wraparound)
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2024-01-15 00:00:00
Made public.2023-12-18 00:00:00
Event: Reported to Red Hat.
Date: 2024-01-15 00:00:00
Event: Made public.
Date: 2023-12-18 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:1188
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1404
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1532
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1533
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1607
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:1614
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2093
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:2394
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-0565
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2258518
issue-tracking
x_refsource_REDHAT
https://www.spinics.net/lists/stable-commits/msg328851.html
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1188
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1404
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1532
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1533
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1607
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1614
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2093
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2394
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-0565
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2258518
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://www.spinics.net/lists/stable-commits/msg328851.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:1188
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1404
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1532
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1533
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1607
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:1614
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:2093
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:2394
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/security/cve/CVE-2024-0565
vdb-entry
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2258518
issue-tracking
x_refsource_REDHAT
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://security.netapp.com/advisory/ntap-20240223-0002/
x_transferred
https://www.spinics.net/lists/stable-commits/msg328851.html
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1188
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1404
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1532
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1533
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1607
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1614
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2093
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2394
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-0565
Resource:
vdb-entry
x_refsource_REDHAT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2258518
Resource:
issue-tracking
x_refsource_REDHAT
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240223-0002/
Resource:
x_transferred
Hyperlink: https://www.spinics.net/lists/stable-commits/msg328851.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:15 Jan, 2024 | 20:15
Updated At:14 Sep, 2024 | 00:15

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.4HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Secondary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.4
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.1.36(inclusive) to 6.7(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.7
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.7
cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.7
cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.7
cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>6.7
cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*
NetApp, Inc.
netapp
>>ontap_tools>>-
cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*
Weaknesses
CWE IDTypeSource
CWE-191Primarynvd@nist.gov
CWE-191Secondarysecalert@redhat.com
CWE ID: CWE-191
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-191
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2024:1188secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1404secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1532secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1533secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1607secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:1614secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:2093secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2024:2394secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2024-0565secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2258518secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://www.spinics.net/lists/stable-commits/msg328851.htmlsecalert@redhat.com
Mailing List
Patch
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1188
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1404
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1532
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1533
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1607
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:1614
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2093
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:2394
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-0565
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2258518
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://www.spinics.net/lists/stable-commits/msg328851.html
Source: secalert@redhat.com
Resource:
Mailing List
Patch

Change History

0
Information is not available yet

Similar CVEs

51Records found

CVE-2025-23335
Matching Score-6
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-6
Assigner-NVIDIA Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 17.72%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 12:44
Updated-12 Aug, 2025 | 16:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability where an attacker could cause an underflow by a specific model configuration and a specific input. A successful exploit of this vulnerability might lead to denial of service.

Action-Not Available
Vendor-NVIDIA CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-triton_inference_serverwindowslinux_kernelTriton Inference Server
CWE ID-CWE-191
Integer Underflow (Wrap or Wraparound)
  • Previous
  • 1
  • 2
  • Next
Details not found