CVE-2024-41079

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41079
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-41079.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-41079
Downstream
Related
Published
2024-07-29T15:04:16.733Z
Modified
2025-11-28T02:34:45.336809Z
Summary
nvmet: always initialize cqe.result
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: always initialize cqe.result

The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA.

Let's make RDMA behave the same and thus explicitly initializing the result field. This prevents leaking any data from the stack.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41079.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
30d35b24b7957922f81cfdaa66f2e1b1e9b9aed2
Fixed
10967873b80742261527a071954be8b54f0f8e4d
Fixed
0990e8a863645496b9e3f91cfcfd63cd95c80319
Fixed
cd0c1b8e045a8d2785342b385cb2684d9b48e426

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.101
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.42
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.11