CVE-2026-23112

Source
https://cve.org/CVERecord?id=CVE-2026-23112
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23112.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23112
Downstream
Published
2026-02-13T13:29:56.724Z
Modified
2026-03-13T04:06:44.697691Z
Summary
nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: add bounds checks in nvmettcpbuildpduiovec

nvmettcpbuildpduiovec() could walk past cmd->req.sg when a PDU length or offset exceeds sgcnt and then use bogus sg->length/offset values, leading to copytoiter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset before building the bvec.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23112.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
872d26a391da92ed8f0c0f5cb5fef428067b7f30
Fixed
043b4307a99f902697349128fde93b2ddde4686c
Fixed
42afe8ed8ad2de9c19457156244ef3e1eca94b5d
Fixed
1385be357e8acd09b36e026567f3a9d5c61139de
Fixed
dca1a6ba0da9f472ef040525fab10fd9956db59f
Fixed
19672ae68d52ff75347ebe2420dde1b07adca09f
Fixed
ab200d71553bdcf4de554a5985b05b2dd606bc57
Fixed
52a0a98549344ca20ad81a4176d68d28e3c05a5c

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23112.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.10.250
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.200
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.163
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.124
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.70
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23112.json"