nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
Summary
| CVE | CVE-2026-23112 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-02-13 14:16:10 UTC |
| Updated | 2026-04-03 14:16:24 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec. |
Risk And Classification
Primary CVSS: v3.1 9.8 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-787
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Secondary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 043b4307a99f902697349128fde93b2ddde4686c git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 42afe8ed8ad2de9c19457156244ef3e1eca94b5d git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 1385be357e8acd09b36e026567f3a9d5c61139de git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 dca1a6ba0da9f472ef040525fab10fd9956db59f git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 19672ae68d52ff75347ebe2420dde1b07adca09f git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 ab200d71553bdcf4de554a5985b05b2dd606bc57 git | Not specified |
| CNA | Linux | Linux | affected 872d26a391da92ed8f0c0f5cb5fef428067b7f30 52a0a98549344ca20ad81a4176d68d28e3c05a5c git | Not specified |
| CNA | Linux | Linux | affected 5.0 | Not specified |
| CNA | Linux | Linux | unaffected 5.0 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.250 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.200 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.163 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.124 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.70 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.10 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/42afe8ed8ad2de9c19457156244ef3e1eca94b5d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/1385be357e8acd09b36e026567f3a9d5c61139de | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/19672ae68d52ff75347ebe2420dde1b07adca09f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/ab200d71553bdcf4de554a5985b05b2dd606bc57 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/043b4307a99f902697349128fde93b2ddde4686c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/dca1a6ba0da9f472ef040525fab10fd9956db59f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/52a0a98549344ca20ad81a4176d68d28e3c05a5c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.