In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux_kernel | < 5.10.250, < 5.15.200, < 6.1.163, < 6.6.124, < 6.12.70, < 6.18.10 |