CVE-2026-23216

Source
https://cve.org/CVERecord?id=CVE-2026-23216
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23216.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23216
Downstream
Published
2026-02-18T14:21:53.699Z
Modified
2026-03-20T12:47:27.465347Z
Summary
scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix use-after-free in iscsitdecconnusagecount()

In iscsitdecconnusagecount(), the function calls complete() while holding the conn->connusagelock. As soon as complete() is invoked, the waiter (such as iscsitcloseconnection()) may wake up and proceed to free the iscsit_conn structure.

If the waiter frees the memory before the current thread reaches spinunlockbh(), it results in a KASAN slab-use-after-free as the function attempts to release a lock within the already-freed connection structure.

Fix this by releasing the spinlock before calling complete().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23216.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e48354ce078c079996f89d715dfa44814b4eba01
Fixed
ba684191437380a07b27666eb4e72748be1ea201
Fixed
8518f072fc92921418cd9ed4268dd4f3e9a8fd75
Fixed
275016a551ba1a068a3bd6171b18611726b67110
Fixed
73b487d44bf4f92942629d578381f89c326ff77f
Fixed
48fe983e92de2c59d143fe38362ad17ba23ec7f3
Fixed
3835e49e146a4e6e7787b29465f1a23379b6ec44
Fixed
9411a89e9e7135cc459178fa77a3f1d6191ae903

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23216.json"