First published: Mon Jan 15 2024(Updated: )
An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.7 | 6.7 |
Linux Kernel | >=6.1.36<6.7 | |
Linux Kernel | =6.7-rc1 | |
Linux Kernel | =6.7-rc2 | |
Linux Kernel | =6.7-rc3 | |
Linux Kernel | =6.7-rc4 | |
Linux Kernel | =6.7-rc5 | |
netapp ontap tools vmware vsphere | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP8 IF01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0565 is classified as high due to its potential for causing a denial of service.
To fix CVE-2024-0565, update your system to the latest kernel version that patches this vulnerability.
CVE-2024-0565 affects Linux Kernel versions below 6.7 and specific earlier release candidates.
Yes, CVE-2024-0565 affects IBM QRadar SIEM versions up to 7.5.0 UP8 IF01.
The potential impacts of CVE-2024-0565 include an out-of-bounds memory read leading to system instability and denial of service.