We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | redhat |
Reserved | 2024-01-15 |
Published | 2024-01-15 |
Updated | 2024-09-13 |
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H |
Integer Underflow (Wrap or Wraparound)
2024-01-15: | Reported to Red Hat. |
2023-12-18: | Made public. |
https://access.redhat.com/errata/RHSA-2024:1188 (RHSA-2024:1188)
https://access.redhat.com/errata/RHSA-2024:1404 (RHSA-2024:1404)
https://access.redhat.com/errata/RHSA-2024:1532 (RHSA-2024:1532)
https://access.redhat.com/errata/RHSA-2024:1533 (RHSA-2024:1533)
https://access.redhat.com/errata/RHSA-2024:1607 (RHSA-2024:1607)
https://access.redhat.com/errata/RHSA-2024:1614 (RHSA-2024:1614)
https://access.redhat.com/errata/RHSA-2024:2093 (RHSA-2024:2093)
https://access.redhat.com/errata/RHSA-2024:2394 (RHSA-2024:2394)
https://access.redhat.com/security/cve/CVE-2024-0565
https://bugzilla.redhat.com/show_bug.cgi?id=2258518 (RHBZ#2258518)
https://www.spinics.net/lists/stable-commits/msg328851.html