Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.0, < 5.10.250 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0b9981751be14b59b4473383c731c833738aebdb
- https://git.kernel.org/stable/c/1385be357e8acd09b36e026567f3a9d5c61139dePatch
- https://git.kernel.org/stable/c/19672ae68d52ff75347ebe2420dde1b07adca09fPatch
- https://git.kernel.org/stable/c/42afe8ed8ad2de9c19457156244ef3e1eca94b5dPatch
- https://git.kernel.org/stable/c/52a0a98549344ca20ad81a4176d68d28e3c05a5cPatch
- https://git.kernel.org/stable/c/ab200d71553bdcf4de554a5985b05b2dd606bc57Patch
- https://git.kernel.org/stable/c/dca1a6ba0da9f472ef040525fab10fd9956db59fPatch
FAQ
What is CVE-2026-23112?
CVE-2026-23112 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU lengt...
How severe is CVE-2026-23112?
CVE-2026-23112 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-23112?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.