CVE-2026-23259

Source
https://cve.org/CVERecord?id=CVE-2026-23259
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23259.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23259
Downstream
Published
2026-03-18T17:41:05.827Z
Modified
2026-04-02T13:12:19.033127Z
Summary
io_uring/rw: free potentially allocated iovec on cache put failure
Details

In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: free potentially allocated iovec on cache put failure

If a read/write request goes through ioreqrwcleanup() and has an allocated iovec attached and fails to put to the rwcache, then it may end up with an unaccounted iovec pointer. Have iorwrecycle() return whether it recycled the request or not, and use that to gauge whether to free a potential iovec or not.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23259.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a9165b83c1937eeed1f0c731468216d6371d647f
Fixed
1d5f2329ab4df65c2ee011b986d8a6e05ad0f67c
Fixed
4b9748055457ac3a0710bf210c229d01ea1b01b9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23259.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.18.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23259.json"