In the Linux kernel, the following vulnerability has been resolved:
nvme-tcp: sanitize request list handling
Validate the request in nvme_tcp_handle_r2t() to ensure it's not part of
any list, otherwise a malicious R2T PDU might inject a loop in request
list processing.
References
Configurations
Configuration 1 (hide)
|
History
18 Nov 2025, 18:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/0bf04c874fcb1ae46a863034296e4b33d8fbd66c - Patch | |
| References | () https://git.kernel.org/stable/c/78a4adcd3fedb0728436e8094848ebf4c6bae006 - Patch | |
| References | () https://git.kernel.org/stable/c/f054ea62598197714a6ca7b3b387a027308f8b13 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
10 Jul 2025, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Jul 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-09 11:15
Updated : 2025-11-18 18:22
NVD link : CVE-2025-38264
Mitre link : CVE-2025-38264
CVE.ORG link : CVE-2025-38264
JSON object : View
Products Affected
linux
- linux_kernel
CWE
