CVE-2024-41079

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41079
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41079.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41079
Downstream
Related
Published
2024-07-29T15:15:15Z
Modified
2025-08-09T20:01:27Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: always initialize cqe.result

The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA.

Let's make RDMA behave the same and thus explicitly initializing the result field. This prevents leaking any data from the stack.

References

Affected packages