"value":"A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"NULL Pointer Dereference",
"cweId":"CWE-476"
}
]
}
]
},
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"n/a",
"product":{
"product_data":[
{
"product_name":"kernel",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"defaultStatus":"affected"
}
}
]
}
}
]
}
},
{
"vendor_name":"Red Hat",
"product":{
"product_data":[
{
"product_name":"Red Hat Enterprise Linux 8.6 Extended Update Support",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"versions":[
{
"version":"0:4.18.0-372.91.1.el8_6",
"lessThan":"*",
"versionType":"rpm",
"status":"unaffected"
}
],
"defaultStatus":"affected"
}
}
]
}
},
{
"product_name":"Red Hat Enterprise Linux 9.2 Extended Update Support",
"version":{
"version_data":[
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"versions":[
{
"version":"0:5.14.0-284.52.1.el9_2",
"lessThan":"*",
"versionType":"rpm",
"status":"unaffected"
}
],
"defaultStatus":"affected"
}
},
{
"version_value":"not down converted",
"x_cve_json_5_version_data":{
"versions":[
{
"version":"0:5.14.0-284.52.1.rt14.337.el9_2",
"lessThan":"*",
"versionType":"rpm",
"status":"unaffected"
}
],
"defaultStatus":"affected"
}
}
]
}
},
{
"product_name":"Red Hat Virtualization 4 for Red Hat Enterprise Linux 8",
"value":"To mitigate this issue, prevent module nvmet-tcp from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically."
}
],
"credits":[
{
"lang":"en",
"value":"Red Hat would like to thank Alon Zahavi for reporting this issue."