← Voltar para CVEs
CVE-2023-6535
MEDIUM6.5
Descricao
A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
Detalhes CVE
Pontuacao CVSS v3.16.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado2/7/2024
Ultima modificacao11/4/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernelredhat:codeready_linux_builder_eusredhat:codeready_linux_builder_eus_for_power_little_endian_eusredhat:codeready_linux_builder_for_arm64_eusredhat:codeready_linux_builder_for_ibm_z_systems_eusredhat:enterprise_linuxredhat:enterprise_linux_eusredhat:enterprise_linux_for_arm_64_eusredhat:enterprise_linux_for_ibm_z_systems_eusredhat:enterprise_linux_for_power_little_endian_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_for_real_time_for_nfvredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat:enterprise_linux_server_tusredhat:virtualization_host
Fraquezas (CWE)
CWE-476
Referencias
https://access.redhat.com/errata/RHSA-2024:0723(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0724(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0725(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0881(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0897(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:1248(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:2094(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:3810(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2023-6535(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2254053(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:0723(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0724(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0725(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0881(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:0897(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:1248(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:2094(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2024:3810(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/security/cve/CVE-2023-6535(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2254053(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20240415-0003/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.