CVE-2026-23112

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*

History

19 Mar 2026, 19:20

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.5
v2 : unknown
v3 : 9.8
CWE NVD-CWE-noinfo CWE-787

18 Mar 2026, 13:42

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: nvmet-tcp: añadir comprobaciones de límites en nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() podría exceder cmd->req.sg cuando una longitud o desplazamiento de PDU excede sg_cnt y luego usar valores sg->length/offset erróneos, lo que lleva a _copy_to_iter() GPF/KASAN. Proteger sg_idx, las entradas restantes y sg->length/offset antes de construir el bvec.
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/043b4307a99f902697349128fde93b2ddde4686c - () https://git.kernel.org/stable/c/043b4307a99f902697349128fde93b2ddde4686c - Patch
References () https://git.kernel.org/stable/c/1385be357e8acd09b36e026567f3a9d5c61139de - () https://git.kernel.org/stable/c/1385be357e8acd09b36e026567f3a9d5c61139de - Patch
References () https://git.kernel.org/stable/c/19672ae68d52ff75347ebe2420dde1b07adca09f - () https://git.kernel.org/stable/c/19672ae68d52ff75347ebe2420dde1b07adca09f - Patch
References () https://git.kernel.org/stable/c/42afe8ed8ad2de9c19457156244ef3e1eca94b5d - () https://git.kernel.org/stable/c/42afe8ed8ad2de9c19457156244ef3e1eca94b5d - Patch
References () https://git.kernel.org/stable/c/52a0a98549344ca20ad81a4176d68d28e3c05a5c - () https://git.kernel.org/stable/c/52a0a98549344ca20ad81a4176d68d28e3c05a5c - Patch
References () https://git.kernel.org/stable/c/ab200d71553bdcf4de554a5985b05b2dd606bc57 - () https://git.kernel.org/stable/c/ab200d71553bdcf4de554a5985b05b2dd606bc57 - Patch
References () https://git.kernel.org/stable/c/dca1a6ba0da9f472ef040525fab10fd9956db59f - () https://git.kernel.org/stable/c/dca1a6ba0da9f472ef040525fab10fd9956db59f - Patch
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel

13 Feb 2026, 14:23

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 14:16

Updated : 2026-04-03 14:16


NVD link : CVE-2026-23112

Mitre link : CVE-2026-23112

CVE.ORG link : CVE-2026-23112


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write