CVE-2026-23261
In the Linux kernel, the following vulnerability has been resolved:
nvme-fc: release admin tagset if init fails
nvme_fabrics creates an NVMe/FC controller in following path:
nvmf_dev_write()
-> nvmf_create_ctrl()
-> nvme_fc_create_ctrl()
-> nvme_fc_init_ctrl()
nvme_fc_init_ctrl() allocates the admin blk-mq resources right after
nvme_add_ctrl() succeeds. If any of the subsequent steps fail (changing
the controller state, scheduling connect work, etc.), we jump to the
fail_ctrl path, which tears down the controller references but never
frees the admin queue/tag set. The leaked blk-mq allocations match the
kmemleak report seen during blktests nvme/fc.
Check ctrl->ctrl.admin_tagset in the fail_ctrl path and call
nvme_remove_admin_tag_set() when it is set so that all admin queue
allocations are reclaimed whenever controller setup aborts.
https://nvd.nist.gov/vuln/detail/CVE-2026-23261
Categories
No category defined
References
416baaa9-dc9f-4396-8d5f-8c081fb06d67
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| Linux |
Linux |
- 5fe335a80548e2eda5d51fab801108b323600e95 < 7c54d3f5ebbc5982daaa004260242dc07ac943ea [affected]
- 17c3a66d7ea2d303f783796d62f99e2e23b68c90 < fa301aef50e3f3b5be6ee53457608beae5aa7a01 [affected]
- ea3442efabd0aa3930c5bab73c3901ef38ef6ac3 < e810b290922c535feb34bc90ab549446fe94d2a3 [affected]
- ea3442efabd0aa3930c5bab73c3901ef38ef6ac3 < d1877cc7270302081a315a81a0ee8331f19f95c8 [affected]
- 0d1840b2dd8fe073c020c39bf8e8e89488070801 [affected]
|
| Linux |
Linux |
- 6.18 [affected]
- < 6.18 [unaffected]
- 6.6.124 ≤ 6.6.* [unaffected]
- 6.12.70 ≤ 6.12.* [unaffected]
- 6.18.10 ≤ 6.18.* [unaffected]
- 6.19 ≤ * [unaffected]
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
| cpe |
start |
end |
| Configuration 1 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.6.118 |
< 6.6.124 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.12.60 |
< 6.12.70 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.18 |
< 6.18.10 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.18 |
< 6.19 |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
>= 6.17.10 |
|
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer