Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2024-41079
HistoryJul 29, 2024 - 3:04 p.m.

CVE-2024-41079 nvmet: always initialize cqe.result

2024-07-2915:04:16
Linux
github.com
2
linux kernel
vulnerability
nvmet
initialize cqe.result
spec
command queue entry
tcp
fc
rdma
data leakage

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

nvmet: always initialize cqe.result

The spec doesn’t mandate that the first two double words (aka results)
for the command queue entry need to be set to 0 when they are not
used (not specified). Though, the target implemention returns 0 for TCP
and FC but not for RDMA.

Let’s make RDMA behave the same and thus explicitly initializing the
result field. This prevents leaking any data from the stack.

AI Score

6.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial