CVE-2024-41079

In the Linux kernel, the following vulnerability has been resolved: nvmet: always initialize cqe.result The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA. Let's make RDMA behave the same and thus explicitly initializing the result field. This prevents leaking any data from the stack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

History

09 Oct 2025, 18:03

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319 - () https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319 - Patch
References () https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d - () https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d - Patch
References () https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2 - () https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2 - Patch
References () https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426 - () https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426 - Patch

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: inicializar siempre cqe.result La especificación no exige que las dos primeras palabras dobles (también conocidas como resultados) para la entrada de la cola de comandos deban establecerse en 0 cuando no lo están usado (no especificado). Sin embargo, la implementación de destino devuelve 0 para TCP y FC, pero no para RDMA. Hagamos que RDMA se comporte igual y así inicialicemos explícitamente el campo de resultado. Esto evita la fuga de datos de la pila.
References () https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319 - () https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319 -
References () https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d - () https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d -
References () https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2 - () https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2 -
References () https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426 - () https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426 -

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-09 18:03


NVD link : CVE-2024-41079

Mitre link : CVE-2024-41079

CVE.ORG link : CVE-2024-41079


JSON object : View

Products Affected

linux

  • linux_kernel