CVE-2024-53681

Source
https://cve.org/CVERecord?id=CVE-2024-53681
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53681.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53681
Downstream
Related
Published
2025-01-15T13:10:22.141Z
Modified
2026-03-20T12:39:42.002046Z
Summary
nvmet: Don't overflow subsysnqn
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: Don't overflow subsysnqn

nvmetrootdiscoverynqnstore treats the subsysnqn string like a fixed size buffer, even though it is dynamically allocated to the size of the string.

Create a new string with kstrndup instead of using the old buffer.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53681.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
95409e277d8343810adf8700d29d4329828d452b
Fixed
86645d8d062af3fdcbdaa0a289b95de55bca827d
Fixed
4db3d750ac7e894278ef1cb1c53cc7d883060496

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53681.json"