CVE-2026-23261

Enriched by CISA
 

In the Linux kernel, the following vulnerability has been resolved: nvme-fc: release admin tagset if init fails nvme_fabrics creates an NVMe/FC controller in following path: nvmf_dev_write() -> nvmf_create_ctrl() -> nvme_fc_create_ctrl() -> nvme_fc_init_ctrl() nvme_fc_init_ctrl() allocates the admin blk-mq resources right after nvme_add_ctrl() succeeds. If any of the subsequent steps fail (changing the controller state, scheduling connect work, etc.), we jump to the fail_ctrl path, which tears down the controller references but never frees the admin queue/tag set. The leaked blk-mq allocations match the kmemleak report seen during blktests nvme/fc. Check ctrl->ctrl.admin_tagset in the fail_ctrl path and call nvme_remove_admin_tag_set() when it is set so that all admin queue allocations are reclaimed whenever controller setup aborts.
https://nvd.nist.gov/vuln/detail/CVE-2026-23261

Categories

No category defined

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Linux Linux
  • 5fe335a80548e2eda5d51fab801108b323600e95 < 7c54d3f5ebbc5982daaa004260242dc07ac943ea [affected]
  • 17c3a66d7ea2d303f783796d62f99e2e23b68c90 < fa301aef50e3f3b5be6ee53457608beae5aa7a01 [affected]
  • ea3442efabd0aa3930c5bab73c3901ef38ef6ac3 < e810b290922c535feb34bc90ab549446fe94d2a3 [affected]
  • ea3442efabd0aa3930c5bab73c3901ef38ef6ac3 < d1877cc7270302081a315a81a0ee8331f19f95c8 [affected]
  • 0d1840b2dd8fe073c020c39bf8e8e89488070801 [affected]
Linux Linux
  • 6.18 [affected]
  • < 6.18 [unaffected]
  • 6.6.124 ≤ 6.6.* [unaffected]
  • 6.12.70 ≤ 6.12.* [unaffected]
  • 6.18.10 ≤ 6.18.* [unaffected]
  • 6.19 ≤ * [unaffected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.6.118 < 6.6.124
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.12.60 < 6.12.70
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.18 < 6.18.10
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.18 < 6.19
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.17.10


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry