Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-0565

Опубликовано: 15 янв. 2024
Источник: debian
EPSS Низкий

Описание

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.6.8-1package
linuxfixed6.1.69-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/eec04ea119691e65227a97ce53c0da6b9b74b0b7 (6.7-rc6)

EPSS

Процентиль: 21%
0.00066
Низкий

Связанные уязвимости

CVSS3: 6.8
ubuntu
больше 1 года назад

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

CVSS3: 6.8
redhat
больше 1 года назад

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

CVSS3: 6.8
nvd
больше 1 года назад

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

CVSS3: 7.4
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.1
github
больше 1 года назад

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

EPSS

Процентиль: 21%
0.00066
Низкий