๐Ÿ” CVE Alert

CVE-2024-0565

MEDIUM 6.8

Kernel: cifs filesystem decryption improper input validation remote code execution vulnerability in function receive_encrypted_standard of client

CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th

An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

CWE CWE-191
Published Jan 15, 2024
Last Updated Nov 6, 2025
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Extended Update Support
All versions affected
Red Hat / Red Hat Virtualization 4 for Red Hat Enterprise Linux 8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / RHOL-5.7-RHEL-8
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1188 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1404 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1532 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1533 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1607 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:1614 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2093 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:2394 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-0565 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2258518 spinics.net: https://www.spinics.net/lists/stable-commits/msg328851.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html security.netapp.com: https://security.netapp.com/advisory/ntap-20240223-0002/