CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%
A flaw was found in the Linux kernel’s NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | - | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_eus | 8.6 | cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_eus | 9.2 | cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_eus_for_power_little_endian_eus | 8.6_ppc64le | cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:8.6_ppc64le:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_eus_for_power_little_endian_eus | 9.2_ppc64le | cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_for_arm64_eus | 8.6_aarch64 | cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6_aarch64:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_for_arm64_eus | 9.2_aarch64 | cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:* |
redhat | codeready_linux_builder_for_ibm_z_systems_eus | 9.2_s390x | cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:* |
redhat | enterprise_linux | 8.0 | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
redhat | enterprise_linux | 9.0 | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
access.redhat.com/errata/RHSA-2024:0723
access.redhat.com/errata/RHSA-2024:0724
access.redhat.com/errata/RHSA-2024:0725
access.redhat.com/errata/RHSA-2024:0881
access.redhat.com/errata/RHSA-2024:0897
access.redhat.com/errata/RHSA-2024:1248
access.redhat.com/errata/RHSA-2024:2094
access.redhat.com/errata/RHSA-2024:3810
access.redhat.com/security/cve/CVE-2023-6535
bugzilla.redhat.com/show_bug.cgi?id=2254053
lists.debian.org/debian-lts-announce/2024/06/msg00016.html
security.netapp.com/advisory/ntap-20240415-0003/
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
50.6%