In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
2025-04-01T16:15:23.470
2025-10-01T20:18:33.740
Modified
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 6.12.19 | Yes |
| Operating System | linux | linux_kernel | < 6.13.7 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |
| Operating System | linux | linux_kernel | 6.14 | Yes |