Description
In the Linux kernel, the following vulnerability has been resolved:

nvme: fix admin queue leak on controller reset

When nvme_alloc_admin_tag_set() is called during a controller reset,
a previous admin queue may still exist. Release it properly before
allocating a new one to avoid orphaning the old queue.

This fixes a regression introduced by commit 03b3bcd319b3 ("nvme: fix
admin request_queue lifetime").
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Admin queue resource leak leading to potential denial of service and kernel instability
Action: Update kernel
AI Analysis

Impact

The kernel bug causes the admin queue allocated during a controller reset to be orphaned instead of properly released, resulting in a resource leak. The resulting unreleased memory can accumulate, degrading system performance or leading to a denial of service. This vulnerability is categorized under CWE-772, reflecting improper resource management.

Affected Systems

The flaw affects all Linux kernel implementations that use the NVMe driver prior to the introduction of the fix. The specific kernel version ranges are not enumerated in the available data, but any kernel build lacking the patch is vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog, implying it is not widely exploited in the wild. Exploitation would likely require local access or elevated privileges that enable interaction with NVMe controller reset commands. The attack vector, inferred from the description, would involve a privileged user resetting the NVMe controller and triggering the leak, potentially leading to resource exhaustion over time.

Generated by OpenCVE AI on March 26, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version containing the commit that fixes the admin queue leak (e.g., post-commit 03b3bcd319b3).
  • If an immediate kernel upgrade is infeasible, consider disabling the NVMe driver temporarily or ensuring that controller resets are performed only during maintenance windows to limit the impact.

Generated by OpenCVE AI on March 26, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CPEs cpe:2.3:o:linux:linux_kernel:6.1.167:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*

Sat, 11 Apr 2026 13:00:00 +0000


Thu, 02 Apr 2026 11:45:00 +0000


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399
CWE-401

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399
CWE-401

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin queue leak on controller reset When nvme_alloc_admin_tag_set() is called during a controller reset, a previous admin queue may still exist. Release it properly before allocating a new one to avoid orphaning the old queue. This fixes a regression introduced by commit 03b3bcd319b3 ("nvme: fix admin request_queue lifetime").
Title nvme: fix admin queue leak on controller reset
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:05:46.223Z

Reserved: 2026-01-13T15:37:46.001Z

Link: CVE-2026-23360

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:34.907

Modified: 2026-04-24T18:59:28.380

Link: CVE-2026-23360

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23360 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:17Z

Weaknesses