{"id":"CVE-2026-31523","summary":"nvme-pci: ensure we're polling a polled queue","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: ensure we're polling a polled queue\n\nA user can change the polled queue count at run time. There's a brief\nwindow during a reset where a hipri task may try to poll that queue\nbefore the block layer has updated the queue maps, which would race with\nthe now interrupt driven queue and may cause double completions.","modified":"2026-05-18T05:59:50.545991575Z","published":"2026-04-22T13:54:37.568Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31523.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0685dd9cb855ab77fcf3577b4702ba1d6df1c98d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/166e31d7dbf6aa44829b98aa446bda5c9580f12a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f12734c4b619f923a4df0b1a46b8098b187d324"},{"type":"WEB","url":"https://git.kernel.org/stable/c/965e2c943f065122f14282a88d70a8a92e12a4da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/acbc72dd1a09df53cafcf577259f4678be6afd6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b222680ba55e018426c4535067a008f1d81a5d21"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b96c7b25eb1b748f3e3b1832ebf028b0b223d7e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba167d5982e2eb6ff9356d409eca592ce99555da"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31523.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31523"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4b04cc6a8f86c4842314def22332de1f15de8523"},{"fixed":"965e2c943f065122f14282a88d70a8a92e12a4da"},{"fixed":"ba167d5982e2eb6ff9356d409eca592ce99555da"},{"fixed":"0685dd9cb855ab77fcf3577b4702ba1d6df1c98d"},{"fixed":"6f12734c4b619f923a4df0b1a46b8098b187d324"},{"fixed":"acbc72dd1a09df53cafcf577259f4678be6afd6d"},{"fixed":"b96c7b25eb1b748f3e3b1832ebf028b0b223d7e3"},{"fixed":"b222680ba55e018426c4535067a008f1d81a5d21"},{"fixed":"166e31d7dbf6aa44829b98aa446bda5c9580f12a"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31523.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.0.0"},{"fixed":"5.10.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.203"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.168"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.131"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.80"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.21"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31523.json"}}],"schema_version":"1.7.5"}