CVE-2026-23259
In the Linux kernel, the following vulnerability has been resolved:
io_uring/rw: free potentially allocated iovec on cache put failure
If a read/write request goes through io_req_rw_cleanup() and has an
allocated iovec attached and fails to put to the rw_cache, then it may
end up with an unaccounted iovec pointer. Have io_rw_recycle() return
whether it recycled the request or not, and use that to gauge whether to
free a potential iovec or not.
https://nvd.nist.gov/vuln/detail/CVE-2026-23259
Categories
No category defined
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| Linux |
Linux |
- a9165b83c1937eeed1f0c731468216d6371d647f < 1d5f2329ab4df65c2ee011b986d8a6e05ad0f67c [affected]
- a9165b83c1937eeed1f0c731468216d6371d647f < 4b9748055457ac3a0710bf210c229d01ea1b01b9 [affected]
|
| Linux |
Linux |
- 6.10 [affected]
- < 6.10 [unaffected]
- 6.18.10 ≤ 6.18.* [unaffected]
- 6.19 ≤ * [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.10 |
< 6.18.10 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.10 |
< 6.19 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer