๐ ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฎ๐ฏ๐ญ๐ญ๐ฎ: ๐ก๐ฉ๐ ๐ฒ/๐ง๐๐ฃ ๐๐ฒ๐ฟ๐ป๐ฒ๐น ๐๐ผ๐ฆ ๐ฉ๐ฒ๐ฐ๐๐ผ๐ฟ โ ๐ค๐๐ถ๐ฐ๐ธ ๐๐ป๐๐ถ๐ด๐ต๐
A new Linux kernel vulnerability (CVE-2026-23112) affects the NVMe/TCP target (nvmet-tcp), exposing systems to potential kernel crashes and Denial of Service (DoS) conditions.
โ๏ธ ๐ช๐ต๐ฎ๐โ๐ ๐ต๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ถ๐ป๐ด?
Improper validation in nvmet_tcp_build_pdu_iovec()
Out-of-bounds access in scatter-gather (SG) lists
Triggered via crafted NVMe/TCP traffic
โก๏ธ Result: NULL pointer dereference โ kernel panic
๐จ ๐ช๐ต๐ ๐ถ๐ ๐บ๐ฎ๐๐๐ฒ๐ฟ๐
Impacts availability, not privilege escalation
Relevant in NVMe/TCP storage environments
Higher risk if exposed beyond trusted networks
๐ก๏ธ ๐ฅ๐๐๐๐๐ก๐ข๐๐ ๐ฆ๐๐ฎ๐๐๐: ๐ก๐ผ๐ ๐ฎ๐ณ๐ณ๐ฒ๐ฐ๐๐ฒ๐ฑ
NVMe/TCP target is ๐ป๐ผ๐ ๐๐๐ฒ๐ฑ ๐ป๐ผ๐ฟ ๐น๐ผ๐ฎ๐ฑ๐ฒ๐ฑ
Not part of the RELIANOID architecture
โก๏ธ No exploit path in real deployments
โ ๐ฅ๐ฒ๐ฐ๐ผ๐บ๐บ๐ฒ๐ป๐ฑ๐ฎ๐๐ถ๐ผ๐ป
No immediate action required for RELIANOID users
Upgrade to:
EE > 8.5
CE > 7.9
Review NVMe/TCP exposure in your infrastructure
๐ Full technical breakdown in the article below.
https://www.relianoid.com/resources/knowledge-base/troubleshooting/cve-2026-23112-null-pointer-dereference-in-nvme-tcp-nvmet_tcp_build_pdu_iovec/
#CyberSecurity #LinuxKernel #NVMe #CIO #ITSecurity #Networking #RELIANOID












