In the Linux kernel, the following vulnerability has been resolved:
nvmet: Don't overflow subsysnqn
nvmet_root_discovery_nqn_store treats the subsysnqn string like a fixed
size buffer, even though it is dynamically allocated to the size of the
string.
Create a new string with kstrndup instead of using the old buffer.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: nvmet: Don't overflow subsysnqn nvmet_root_discovery_nqn_store treats the subsysnqn string like a fixed size buffer, even though it is dynamically allocated to the size of the string. Create a new string with kstrndup instead of using the old buffer. | |
Title | nvmet: Don't overflow subsysnqn | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2025-01-15T13:10:22.141Z
Updated: 2025-01-15T13:10:22.141Z
Reserved: 2025-01-15T13:08:59.671Z
Link: CVE-2024-53681
Vulnrichment
No data.
NVD
Status : Received
Published: 2025-01-15T13:15:10.963
Modified: 2025-01-15T13:15:10.963
Link: CVE-2024-53681
Redhat
No data.