CVE-2026-23193

N/A Unknown

📋 TL;DR

A use-after-free vulnerability in the Linux kernel's iSCSI target subsystem allows race conditions during session cleanup. This can lead to kernel memory corruption and potential system crashes. Systems using the iSCSI target functionality in affected Linux kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with iSCSI target subsystem enabled
Versions: Specific kernel versions containing the vulnerable code (check git commits for exact ranges)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when CONFIG_TARGET_CORE is enabled and iSCSI target functionality is in use.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, denial of service, or potential privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability, kernel crashes, or denial of service affecting iSCSI storage connectivity.

🟢

If Mitigated

Minimal impact if iSCSI target functionality is disabled or not in use.

🌐 Internet-Facing: LOW - iSCSI targets are typically internal storage protocols not exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers with iSCSI access could potentially trigger the race condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires iSCSI access and ability to trigger session cleanup race conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits (11ebafffce31efc6abeb28c509017976fc49f1ca and related)

Vendor Advisory: https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel.

🔧 Temporary Workarounds

Disable iSCSI target functionality

Linux

If iSCSI target services are not required, disable the subsystem to eliminate the vulnerability.

echo 'blacklist target_core_mod' >> /etc/modprobe.d/blacklist.conf
rmmod target_core_mod

🧯 If You Can't Patch

  • Restrict iSCSI access to trusted networks and users only
  • Monitor systems for kernel panics or unusual iSCSI session behavior

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if iSCSI target modules are loaded: 'lsmod | grep target' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits or is newer than vulnerable versions

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • KASAN use-after-free reports in dmesg
  • iSCSI session cleanup errors

Network Indicators:

  • Unusual iSCSI session termination patterns

SIEM Query:

search 'kernel:.*use-after-free.*iscsi' OR 'kernel:.*KASAN.*session' in system logs

🔗 References

📤 Share & Export