Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() In iscsit_dec_conn_usage_count(), the function calls complete() while holding the conn->conn_usage_lock. As soon as complete() is invoked, the waiter (such as iscsit_close_connection()) may wake up and proceed to free the iscsit_conn structure. If the waiter frees the memory before the current thread reaches spin_unlock_bh(), it results in a KASAN slab-use-after-free as the function attempts to release a lock within the already-freed connection structure. Fix this by releasing the spinlock before calling complete().

PUBLISHED Reserved 2026-01-13 | Published 2026-02-18 | Updated 2026-02-20 | Assigner Linux

Product status

Default status
unaffected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before ba684191437380a07b27666eb4e72748be1ea201
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 8518f072fc92921418cd9ed4268dd4f3e9a8fd75
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 275016a551ba1a068a3bd6171b18611726b67110
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 73b487d44bf4f92942629d578381f89c326ff77f
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 48fe983e92de2c59d143fe38362ad17ba23ec7f3
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 3835e49e146a4e6e7787b29465f1a23379b6ec44
affected

e48354ce078c079996f89d715dfa44814b4eba01 (git) before 9411a89e9e7135cc459178fa77a3f1d6191ae903
affected

Default status
affected

3.1
affected

Any version before 3.1
unaffected

5.10.250 (semver)
unaffected

5.15.200 (semver)
unaffected

6.1.163 (semver)
unaffected

6.6.124 (semver)
unaffected

6.12.70 (semver)
unaffected

6.18.10 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ba684191437380a07b27666eb4e72748be1ea201

git.kernel.org/...c/8518f072fc92921418cd9ed4268dd4f3e9a8fd75

git.kernel.org/...c/275016a551ba1a068a3bd6171b18611726b67110

git.kernel.org/...c/73b487d44bf4f92942629d578381f89c326ff77f

git.kernel.org/...c/48fe983e92de2c59d143fe38362ad17ba23ec7f3

git.kernel.org/...c/3835e49e146a4e6e7787b29465f1a23379b6ec44

git.kernel.org/...c/9411a89e9e7135cc459178fa77a3f1d6191ae903

cve.org (CVE-2026-23216)

nvd.nist.gov (CVE-2026-23216)

Download JSON