CVE-2026-23306
Use-After-Free Vulnerability in Linux pm8001 SCSI Driver
Publication date: 2026-03-25
Last updated on: 2026-04-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's pm8001 SCSI driver, specifically in the function pm8001_queue_command().
A recent code refactor changed pm8001_queue_command() to return an error (-ENODEV) when the physical device is down or gone. In this error path, the function updates the task status and calls task_done(), which frees the underlying SAS task.
However, the caller (libsas sas_ata_qc_issue()) interprets the -ENODEV return as the task not being handled and attempts to free the task again, causing a double free scenario.
The fix involves pm8001_queue_command() returning 0 instead of -ENODEV in this case to indicate the task has been handled and prevent the double free.
How can this vulnerability impact me? :
This vulnerability can lead to a double free condition in the Linux kernel's SCSI driver, which may cause system instability or crashes.
Exploitation of this issue could potentially allow an attacker to cause a denial of service by crashing the kernel or corrupting kernel memory.
Such memory corruption issues might also be leveraged for privilege escalation or arbitrary code execution, although this specific impact is not detailed in the provided information.