CVE-2026-23216
📋 TL;DR
This is a use-after-free vulnerability in the Linux kernel's iSCSI target subsystem. It allows local attackers with access to iSCSI connections to potentially crash the kernel or execute arbitrary code. Systems using the iSCSI target functionality in affected kernel versions are vulnerable.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to denial of service, or potential privilege escalation to kernel-level code execution.
Likely Case
Kernel crash causing system instability or denial of service.
If Mitigated
Limited impact if iSCSI target functionality is disabled or unused.
🎯 Exploit Status
Requires local access and ability to interact with iSCSI target subsystem. Race condition exploitation adds complexity.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with fixes available (see references)
Vendor Advisory: https://git.kernel.org/stable/c/275016a551ba1a068a3bd6171b18611726b67110
Restart Required: Yes
Instructions:
1. Update to patched kernel version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable iSCSI target subsystem
linuxIf iSCSI target functionality is not needed, disable it to remove attack surface.
modprobe -r target_core_mod iscsi_target_mod
echo 'blacklist target_core_mod' >> /etc/modprobe.d/blacklist.conf
echo 'blacklist iscsi_target_mod' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Restrict access to iSCSI target subsystem to trusted users only
- Monitor system logs for kernel crashes or unusual iSCSI activity
🔍 How to Verify
Check if Vulnerable:
Check if iSCSI target modules are loaded: lsmod | grep -E 'target_core_mod|iscsi_target_mod'
Check Version:
uname -r
Verify Fix Applied:
Check kernel version against patched versions from references: uname -r
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- KASAN slab-use-after-free reports in dmesg
- iSCSI connection errors
Network Indicators:
- Unusual iSCSI connection patterns
- Multiple iSCSI connection attempts
SIEM Query:
source="kernel" AND ("KASAN" OR "use-after-free" OR "slab") AND "iscsi"
🔗 References
- https://git.kernel.org/stable/c/275016a551ba1a068a3bd6171b18611726b67110
- https://git.kernel.org/stable/c/3835e49e146a4e6e7787b29465f1a23379b6ec44
- https://git.kernel.org/stable/c/48fe983e92de2c59d143fe38362ad17ba23ec7f3
- https://git.kernel.org/stable/c/73b487d44bf4f92942629d578381f89c326ff77f
- https://git.kernel.org/stable/c/8518f072fc92921418cd9ed4268dd4f3e9a8fd75
- https://git.kernel.org/stable/c/9411a89e9e7135cc459178fa77a3f1d6191ae903
- https://git.kernel.org/stable/c/ba684191437380a07b27666eb4e72748be1ea201