CVE-2026-23148

Source
https://cve.org/CVERecord?id=CVE-2026-23148
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23148.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23148
Downstream
Related
Published
2026-02-14T16:01:17.575Z
Modified
2026-04-04T03:03:19.389390Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
Details

In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix race in nvmetbiodone() leading to NULL pointer dereference

There is a race condition in nvmetbiodone() that can cause a NULL pointer dereference in blkcgroupbio_start():

  1. nvmetbiodone() is called when a bio completes
  2. nvmetreqcomplete() is called, which invokes req->ops->queue_response(req)
  3. The queue_response callback can re-queue and re-submit the same request
  4. The re-submission reuses the same inlinebio from nvmetreq
  5. Meanwhile, nvmetreqbioput() (called after nvmetreqcomplete) invokes biouninit() for inlinebio, which sets bio->biblkg to NULL
  6. The re-submitted bio enters submitbionoacct_nocheck()
  7. blkcgroupbiostart() dereferences bio->biblkg, causing a crash:

    BUG: kernel NULL pointer dereference, address: 0000000000000028

    PF: supervisor read access in kernel mode

    RIP: 0010:blkcgroupbiostart+0x10/0xd0 Call Trace: submitbionoacctnocheck+0x44/0x250 nvmetbdevexecuterw+0x254/0x370 [nvmet] processonework+0x193/0x3c0 workerthread+0x281/0x3a0

Fix this by reordering nvmetbiodone() to call nvmetreqbioput() BEFORE nvmetreq_complete(). This ensures the bio is cleaned up before the request can be re-submitted, preventing the race condition.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23148.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
431e58d56fcb5ff1f9eb630724a922e0d2a941df
Fixed
ee10b06980acca1d46e0fa36d6fb4a9578eab6e4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
190f4c2c863af7cc5bb354b70e0805f06419c038
Fixed
68207ceefd71cc74ce4e983fa9bd10c3122e349b
Fixed
0fcee2cfc4b2e16e62ff8e0cc2cd8dd24efad65e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2e2028fcf924d1c6df017033c8d6e28b735a0508

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23148.json"