{"id":"CVE-2026-23216","summary":"scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()\n\nIn iscsit_dec_conn_usage_count(), the function calls complete() while\nholding the conn-\u003econn_usage_lock. As soon as complete() is invoked, the\nwaiter (such as iscsit_close_connection()) may wake up and proceed to free\nthe iscsit_conn structure.\n\nIf the waiter frees the memory before the current thread reaches\nspin_unlock_bh(), it results in a KASAN slab-use-after-free as the function\nattempts to release a lock within the already-freed connection structure.\n\nFix this by releasing the spinlock before calling complete().","modified":"2026-05-01T08:30:09.286538450Z","published":"2026-02-18T14:21:53.699Z","related":["SUSE-SU-2026:1573-1","SUSE-SU-2026:1661-1","SUSE-SU-2026:21114-1","SUSE-SU-2026:21123-1","SUSE-SU-2026:21237-1","SUSE-SU-2026:21255-1","SUSE-SU-2026:21352-1","SUSE-SU-2026:21361-1","openSUSE-SU-2026:20572-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23216.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/275016a551ba1a068a3bd6171b18611726b67110"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3835e49e146a4e6e7787b29465f1a23379b6ec44"},{"type":"WEB","url":"https://git.kernel.org/stable/c/48fe983e92de2c59d143fe38362ad17ba23ec7f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/73b487d44bf4f92942629d578381f89c326ff77f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8518f072fc92921418cd9ed4268dd4f3e9a8fd75"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9411a89e9e7135cc459178fa77a3f1d6191ae903"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba684191437380a07b27666eb4e72748be1ea201"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23216.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23216"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e48354ce078c079996f89d715dfa44814b4eba01"},{"fixed":"ba684191437380a07b27666eb4e72748be1ea201"},{"fixed":"8518f072fc92921418cd9ed4268dd4f3e9a8fd75"},{"fixed":"275016a551ba1a068a3bd6171b18611726b67110"},{"fixed":"73b487d44bf4f92942629d578381f89c326ff77f"},{"fixed":"48fe983e92de2c59d143fe38362ad17ba23ec7f3"},{"fixed":"3835e49e146a4e6e7787b29465f1a23379b6ec44"},{"fixed":"9411a89e9e7135cc459178fa77a3f1d6191ae903"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23216.json"}}],"schema_version":"1.7.5"}