Race condition in Linux kernel - CVE-2026-31523
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a race condition in nvme-pci polled queue handling when polling a queue during a reset while queue mappings are being updated. A local user can change the polled queue count at run time to trigger double completions and cause a denial of service.
The issue occurs during a brief window before the block layer has updated the queue maps.
How to mitigate CVE-2026-31523
Sources
- https://git.kernel.org/stable/c/0685dd9cb855ab77fcf3577b4702ba1d6df1c98d
- https://git.kernel.org/stable/c/166e31d7dbf6aa44829b98aa446bda5c9580f12a
- https://git.kernel.org/stable/c/6f12734c4b619f923a4df0b1a46b8098b187d324
- https://git.kernel.org/stable/c/965e2c943f065122f14282a88d70a8a92e12a4da
- https://git.kernel.org/stable/c/acbc72dd1a09df53cafcf577259f4678be6afd6d
- https://git.kernel.org/stable/c/b222680ba55e018426c4535067a008f1d81a5d21
- https://git.kernel.org/stable/c/b96c7b25eb1b748f3e3b1832ebf028b0b223d7e3
- https://git.kernel.org/stable/c/ba167d5982e2eb6ff9356d409eca592ce99555da