A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
Workaround:
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0723 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0724 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0725 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0881 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0897 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1248 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2094 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3810 | third party advisory vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-6356 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2254054 | issue tracking |
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html | |
https://security.netapp.com/advisory/ntap-20240415-0002/ |