CVE-2026-23193
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's iSCSI target subsystem allows race conditions during session cleanup. This can lead to kernel memory corruption and potential system crashes. Systems using the iSCSI target functionality in affected Linux kernel versions are vulnerable.
💻 Affected Systems
- Linux kernel with iSCSI target subsystem enabled
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.
Likely Case
System instability, kernel crashes, or denial of service affecting iSCSI storage connectivity.
If Mitigated
Minimal impact if iSCSI target functionality is disabled or not in use.
🎯 Exploit Status
Requires iSCSI access and ability to trigger session cleanup race conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits (11ebafffce31efc6abeb28c509017976fc49f1ca and related)
Vendor Advisory: https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca
Restart Required: Yes
Instructions:
1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Disable iSCSI target functionality
LinuxIf iSCSI target services are not required, disable the subsystem to eliminate the vulnerability.
echo 'blacklist target_core_mod' >> /etc/modprobe.d/blacklist.conf
rmmod target_core_mod
🧯 If You Can't Patch
- Restrict iSCSI access to trusted networks and users only
- Monitor systems for kernel panics or unusual iSCSI session behavior
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if iSCSI target modules are loaded: 'lsmod | grep target' and 'uname -r'
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits or is newer than vulnerable versions
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN use-after-free reports in dmesg
- iSCSI session cleanup errors
Network Indicators:
- Unusual iSCSI session termination patterns
SIEM Query:
search 'kernel:.*use-after-free.*iscsi' OR 'kernel:.*KASAN.*session' in system logs
🔗 References
- https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca
- https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d
- https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7
- https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4
- https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a
- https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9
- https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb