CVE-2026-23112

Severity
9.8CRITICAL
EPSS
0.1%
top 77.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 13

Description

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel5.05.10.250+6
CVEListV5linux/linux872d26a391da92ed8f0c0f5cb5fef428067b7f30043b4307a99f902697349128fde93b2ddde4686c+7
Debianlinux< 5.10.251-1+3
Debianlinux-6.1< 6.1.164-1~deb11u1

Patches

🔴Vulnerability Details

3
CVEList
nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec2026-02-13
OSV
CVE-2026-23112: In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iove2026-02-13
GHSA
GHSA-jjrf-jfrm-p64x: In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_io2026-02-13

📋Vendor Advisories

2
Red Hat
kernel: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec2026-02-13
Debian
CVE-2026-23112: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23112 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23112 (CRITICAL CVSS 9.8) | In the Linux kernel | cvebase.io