CVE-2026-23306Linux vulnerability

8 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 97.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free in pm8001_queue_command() Commit e29c47fe8946 ("scsi: pm8001: Simplify pm8001_task_exec()") refactors pm8001_queue_command(), however it introduces a potential cause of a double free scenario when it changes the function to return -ENODEV in case of phy down/device gone state. In this path, pm8001_queue_command() updates task status and calls task_done to indicate to upper layer that the task

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel5.18.06.1.167+4
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxe29c47fe8946cc732b0e0d393b65b13c84bb69d0ebbb852ffbc952b95ddb7e3872b67b3e74c6da47+6
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
OSV
scsi: pm8001: Fix use-after-free in pm8001_queue_command()2026-03-25
OSV
CVE-2026-23306: In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free in pm8001_queue_command() Commit e29c47fe8946 ("s2026-03-25
GHSA
GHSA-m6g2-mpp7-vr6r: In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free in pm8001_queue_command() Commit e29c47fe8946 (2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: scsi: pm8001: Fix use-after-free in pm8001_queue_command()2026-03-25
Microsoft
scsi: pm8001: Fix use-after-free in pm8001_queue_command()2026-03-10
Debian
CVE-2026-23306: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: pm800...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23306 Impact, Exploitability, and Mitigation Steps | Wiz