{"id":"CVE-2026-23193","summary":"scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess-\u003esession_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.","modified":"2026-05-01T08:30:12.466557175Z","published":"2026-02-14T16:27:20.251Z","related":["ALSA-2026:6153","ALSA-2026:6571","ALSA-2026:6572","ALSA-2026:6632","SUSE-SU-2026:1573-1","SUSE-SU-2026:1661-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21237-1","SUSE-SU-2026:21255-1","SUSE-SU-2026:21352-1","SUSE-SU-2026:21361-1","openSUSE-SU-2026:20572-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23193.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23193.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23193"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e48354ce078c079996f89d715dfa44814b4eba01"},{"fixed":"2b64015550a13bcc72910be0565548d9a754d46d"},{"fixed":"fd8b0900173307039d3a84644c2fee041a7ed4fb"},{"fixed":"d8dbdc146e9e9a976931b78715be2e91299049f9"},{"fixed":"11ebafffce31efc6abeb28c509017976fc49f1ca"},{"fixed":"41b86a9ec037bd3435d68dd3692f0891a207e7e7"},{"fixed":"4530f4e4d0e6a207110b0ffed0c911bca43531a4"},{"fixed":"84dc6037390b8607c5551047d3970336cb51ba9a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23193.json"}}],"schema_version":"1.7.5"}