First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2356593 is considered high due to the potential for memory corruption.
To fix REDHAT-BUG-2356593, update the Linux kernel to the latest version that contains the security patch addressing this vulnerability.
REDHAT-BUG-2356593 addresses a vulnerability in the nvme_tcp_recv_pdu() function of the Linux kernel that could lead to memory corruption due to unvalidated header lengths.
The affected software for REDHAT-BUG-2356593 is the Linux Kernel.
REDHAT-BUG-2356593 makes it possible for an attacker to exploit a memory corruption issue through malformed NVMe TCP packets.