CVE-2024-41079

critical

Description

In the Linux kernel, the following vulnerability has been resolved: nvmet: always initialize cqe.result The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA. Let's make RDMA behave the same and thus explicitly initializing the result field. This prevents leaking any data from the stack.

References

https://git.kernel.org/stable/c/cd0c1b8e045a8d2785342b385cb2684d9b48e426

https://git.kernel.org/stable/c/30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2

https://git.kernel.org/stable/c/10967873b80742261527a071954be8b54f0f8e4d

https://git.kernel.org/stable/c/0990e8a863645496b9e3f91cfcfd63cd95c80319

Details

Source: Mitre, NVD

Published: 2024-07-29

Updated: 2024-07-29

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

Severity: Critical