CVE-2026-23355
Race Condition in Linux libata Deferred Queue Cancelling Leads to WARN_ON
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.19.4 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | From 6.18.14 (inc) to 6.18.18 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ATA subsystem, specifically in how deferred queued commands (deferred_qc) are handled in libata. The issue arises because when deferred_qc is cleared, the pending work associated with it is not canceled. This can lead to a scenario where work related to an old non-NCQ command is executed after the port has been reset and new commands have been queued, causing unexpected behavior.
The problem occurs because the function ata_scsi_deferred_qc_work() may run long after the work was scheduled, and if the deferred_qc was cleared in the meantime without canceling the work, the work will still execute. This can cause warnings and potentially incorrect handling of commands.
The fix involves ensuring that the pending work is always canceled after clearing deferred_qc, preventing the execution of stale work.
How can this vulnerability impact me? :
This vulnerability can lead to unexpected behavior in the handling of ATA commands in the Linux kernel, potentially causing warnings or errors during command processing. While the description does not explicitly mention security impacts such as data corruption or privilege escalation, the improper handling of deferred commands could affect system stability or reliability, especially in environments relying on NCQ (Native Command Queuing).