nvme: fix admin queue leak on controller reset
Summary
| CVE | CVE-2026-23360 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:34 UTC |
| Updated | 2026-04-24 18:59:28 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin queue leak on controller reset When nvme_alloc_admin_tag_set() is called during a controller reset, a previous admin queue may still exist. Release it properly before allocating a new one to avoid orphaning the old queue. This fixes a regression introduced by commit 03b3bcd319b3 ("nvme: fix admin request_queue lifetime"). |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.000320000 probability, percentile 0.091100000 (date 2026-04-15)
Problem Types: CWE-401
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected ff037b5f47eeccc1636c03f84cd47db094eb73c9 089a6f17881a82c6c6e05f8564a867be0767eade git | Not specified |
| CNA | Linux | Linux | affected 4896491c497226022626c3acc46044fd182f943c 6e28bab900e40e4d610b04f9f82e01983d8fb356 git | Not specified |
| CNA | Linux | Linux | affected a505f0ba36ab24176c300d7ff56aff85c2977e6c 2efbc838a26d3da72d8fe05770bdf869d4ca3ac5 git | Not specified |
| CNA | Linux | Linux | affected e8061d02b49c5c901980f58d91e96580e9a14acf 64f87b96de0e645a4c066c7cffd753f334446db6 git | Not specified |
| CNA | Linux | Linux | affected 03b3bcd319b3ab5182bc9aaa0421351572c78ac0 e159eb852aeee95443a9458ecb7d072bbb689913 git | Not specified |
| CNA | Linux | Linux | affected 03b3bcd319b3ab5182bc9aaa0421351572c78ac0 8eb2b3cdcd9b6631b94b82c1f4f6bc32b40d942f git | Not specified |
| CNA | Linux | Linux | affected 03b3bcd319b3ab5182bc9aaa0421351572c78ac0 b84bb7bd913d8ca2f976ee6faf4a174f91c02b8d git | Not specified |
| CNA | Linux | Linux | affected e7dac681790556c131854b97551337aa8042215b git | Not specified |
| CNA | Linux | Linux | affected 6.18 | Not specified |
| CNA | Linux | Linux | unaffected 6.18 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.168 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.131 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.77 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.17 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.7 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/e159eb852aeee95443a9458ecb7d072bbb689913 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/8eb2b3cdcd9b6631b94b82c1f4f6bc32b40d942f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/2efbc838a26d3da72d8fe05770bdf869d4ca3ac5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/089a6f17881a82c6c6e05f8564a867be0767eade | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/b84bb7bd913d8ca2f976ee6faf4a174f91c02b8d | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/64f87b96de0e645a4c066c7cffd753f334446db6 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| git.kernel.org/stable/c/6e28bab900e40e4d610b04f9f82e01983d8fb356 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.