PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-23307 Linux CVE debrief

CVE-2024-23307 is a Linux kernel vulnerability classified by NVD as a CWE-190 integer overflow/wraparound issue. The CVSS 3.1 score is 4.4 (AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H), so the main concern is availability rather than data compromise. NVD’s affected-version criteria show multiple vulnerable release bands, making kernel update hygiene the key mitigation.

Vendor
Linux
Product
CVE-2024-23307
CVSS
MEDIUM 4.4
CISA KEV
Not listed in stored evidence
Original CVE published
2024-01-25
Original CVE updated
2026-05-12
Advisory published
2024-01-25
Advisory updated
2026-05-12

Who should care

Linux platform owners, distro maintainers, server and appliance operators, and anyone running affected Linux kernel lines on systems where kernel availability matters. This is especially relevant for environments that rely on md/raid/raid5 functionality or custom kernel builds.

Technical summary

NVD associates CVE-2024-23307 with CWE-190 and Linux kernel version ranges spanning 4.1 up to, but not including, 6.1.84; 6.2 up to 6.6.24; 6.7 up to 6.7.12; and 6.8 up to 6.8.3. The supplied description characterizes the issue as an integer overflow or wraparound in Linux kernel code paths on x86 and ARM, including md/raid/raid5 modules, with the practical impact described as forced integer overflow and resulting availability loss. The record is not marked KEV in the supplied data.

Defensive priority

Medium priority. This is not a KEV item in the supplied corpus and the CVSS score is below the common critical/high bands, but it affects kernel code and can directly impact system availability. Patch during your normal expedited maintenance cycle, sooner for exposed or mission-critical hosts.

Recommended defensive actions

  • Check whether any Linux kernel systems fall within the affected version ranges listed by NVD.
  • Prioritize patching to the first fixed release in your distro or vendor channel for each affected branch.
  • Pay special attention to hosts using md/raid/raid5 functionality or custom kernels that may not inherit vendor backports automatically.
  • Verify remediation by confirming the running kernel version and vendor backport status after update.
  • Monitor vendor advisories and issue trackers referenced by NVD for any distro-specific guidance or backport notes.

Evidence notes

CVE publishedAt in the supplied timeline is 2024-01-25T07:15:09.940Z; modifiedAt is 2026-05-12T12:16:17.570Z. NVD metadata lists CVSS 3.1 vector AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H and CWE-190. The vulnerable CPE criteria identify four affected Linux kernel version bands with end versions 6.1.84, 6.6.24, 6.7.12, and 6.8.3. NVD references an OpenAnolis Bugzilla issue and a Siemens product security advisory.

Official resources

Publicly disclosed in the CVE record on 2024-01-25. The NVD entry was later modified on 2026-05-12; this debrief reflects the supplied published CVE data and NVD metadata, not the generation date.