An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
| Version | Base score | Base severity | Vector |
|---|---|---|---|
| 3.1 | 6.8 | MEDIUM | CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
| CAPEC ID | Description |
|---|
To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
| Event | Date |
|---|---|
| Reported to Red Hat. | 2024-01-15 00:00:00 |
| Made public. | 2023-12-18 00:00:00 |
| Hyperlink | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2024:1188 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:1404 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:1532 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:1533 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:1607 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:1614 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:2093 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2024:2394 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2024-0565 | vdb-entry x_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2258518 | issue-tracking x_refsource_REDHAT |
| https://www.spinics.net/lists/stable-commits/msg328851.html | N/A |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|