An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Ontap Tools Subscribe
Enterprise Linux Subscribe
Logging Subscribe
Rhel Eus Subscribe
Rhev Hypervisor Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3842-1 linux-5.10 security update
Debian DSA Debian DSA DSA-5681-1 linux security update
EUVD EUVD EUVD-2024-16358 An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
Ubuntu USN Ubuntu USN USN-6639-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-6648-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6648-2 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6651-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6651-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6651-3 Linux kernel (StarFive) vulnerabilities
Ubuntu USN Ubuntu USN USN-6652-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-6653-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-6653-2 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-6653-3 Linux kernel (Low Latency) vulnerabilities
Ubuntu USN Ubuntu USN USN-6653-4 Linux kernel (GKE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, prevent module cifs from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

History

Tue, 03 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Sat, 14 Sep 2024 00:45:00 +0000


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-06T19:54:35.381Z

Reserved: 2024-01-15T19:19:12.076Z

Link: CVE-2024-0565

cve-icon Vulnrichment

Updated: 2024-08-01T18:11:35.146Z

cve-icon NVD

Status : Modified

Published: 2024-01-15T20:15:43.630

Modified: 2024-11-21T08:46:53.230

Link: CVE-2024-0565

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-12-18T00:00:00Z

Links: CVE-2024-0565 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses