Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23216

CVE-2026-23216: Linux Kernel Use-After-Free Vulnerability

CVE-2026-23216 is a use-after-free vulnerability in the Linux kernel iSCSI target subsystem that can cause memory corruption. This article covers the technical details, affected versions, impact, and mitigation.

Published: February 20, 2026

CVE-2026-23216 Overview

CVE-2026-23216 is a use-after-free vulnerability in the Linux kernel's iSCSI target subsystem, specifically within the iscsit_dec_conn_usage_count() function. The flaw occurs due to improper ordering of operations where complete() is called while still holding the conn->conn_usage_lock spinlock. This race condition allows a waiter thread to free the iscsit_conn structure before the current thread releases the lock, resulting in a KASAN slab-use-after-free when attempting to unlock already-freed memory.

Critical Impact

This use-after-free vulnerability in the Linux kernel iSCSI subsystem could lead to system instability, kernel crashes, or potential privilege escalation in systems utilizing iSCSI storage targets.

Affected Products

  • Linux Kernel (multiple stable branches affected)
  • Systems running iSCSI target configurations
  • Enterprise storage servers utilizing Linux-based iSCSI implementations

Discovery Timeline

  • 2026-02-18 - CVE-2026-23216 published to NVD
  • 2026-02-18 - Last updated in NVD database

Technical Details for CVE-2026-23216

Vulnerability Analysis

The vulnerability resides in the iscsit_dec_conn_usage_count() function within the Linux kernel's SCSI target iSCSI subsystem. The core issue stems from a classic use-after-free pattern triggered by incorrect lock ordering relative to synchronization primitives.

When iscsit_dec_conn_usage_count() is invoked, it calls complete() while still holding conn->conn_usage_lock. The complete() function signals a waiter (typically iscsit_close_connection()) that may be blocking on this completion. Once signaled, the waiter immediately proceeds to free the iscsit_conn structure containing the connection state.

However, because the lock is still held by the thread that called complete(), when that thread subsequently attempts to execute spin_unlock_bh() to release conn->conn_usage_lock, it accesses memory within the now-freed connection structure. This triggers a KASAN (Kernel Address Sanitizer) slab-use-after-free detection, indicating memory corruption.

Root Cause

The root cause is improper synchronization ordering in the connection reference counting logic. The spinlock protecting the connection usage count is released after signaling completion, but the completion signal allows another thread to immediately free the protected structure. The fix involves releasing the spinlock before calling complete(), ensuring no further access to the connection structure occurs after signaling.

Attack Vector

This vulnerability can be triggered through normal iSCSI connection teardown operations. An attacker with network access to an iSCSI target service could potentially craft connection sequences that reliably trigger the race condition. The attack surface includes:

  • Network-accessible iSCSI target services
  • Rapid connection establishment and teardown patterns
  • Timing-sensitive operations that exploit the race window between complete() and spin_unlock_bh()

The vulnerability requires network access to the iSCSI target port (typically TCP 3260) and the ability to establish and terminate iSCSI sessions.

Detection Methods for CVE-2026-23216

Indicators of Compromise

  • KASAN (Kernel Address Sanitizer) alerts reporting slab-use-after-free in iscsit_dec_conn_usage_count or related iSCSI functions
  • Kernel panic or oops messages referencing iSCSI target subsystem spinlock operations
  • Unexpected iSCSI target service crashes or kernel-level instability during connection handling

Detection Strategies

  • Enable KASAN in development and testing environments to detect use-after-free violations in the iSCSI subsystem
  • Monitor kernel logs (dmesg, /var/log/kern.log) for BUG, WARNING, or KASAN reports involving iscsi or target subsystem functions
  • Deploy kernel tracing (ftrace, eBPF) on iscsit_dec_conn_usage_count and iscsit_close_connection to identify anomalous call patterns

Monitoring Recommendations

  • Implement continuous monitoring of iSCSI target service availability and stability
  • Configure alerting for kernel oops or panic events on systems running iSCSI targets
  • Track connection establishment and teardown rates to identify potential exploitation attempts through abnormal connection patterns

How to Mitigate CVE-2026-23216

Immediate Actions Required

  • Apply kernel patches from the official Linux kernel stable branches immediately
  • Restrict network access to iSCSI target services using firewall rules to limit exposure
  • Consider temporarily disabling iSCSI target services on non-critical systems until patches are applied
  • Enable KASAN in testing environments to validate patch effectiveness

Patch Information

The Linux kernel maintainers have released patches across multiple stable branches to address this vulnerability. The fix involves reordering operations to release conn->conn_usage_lock before calling complete(), preventing access to potentially freed memory.

Official patches are available through the following kernel commits:

  • Commit 275016a551ba
  • Commit 3835e49e146a
  • Commit 48fe983e92de
  • Commit 73b487d44bf4
  • Commit 8518f072fc92
  • Commit 9411a89e9e71
  • Commit ba684191437

Workarounds

  • Implement network segmentation to restrict access to iSCSI target services from untrusted networks
  • Use iptables or nftables firewall rules to limit connections to TCP port 3260 from authorized initiators only
  • Deploy intrusion detection systems to monitor for unusual iSCSI connection patterns that may indicate exploitation attempts
bash
# Example: Restrict iSCSI target access to specific initiator networks
iptables -A INPUT -p tcp --dport 3260 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 3260 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update
  • Related CVEs
  • CVE-2026-31475: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31469: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31457: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-31444: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English