Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
738 articles · 106204 vulns · 36/50 feeds (7d)
← Back to list
4.7
CVE-2026-23110

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error handler when final completions race against each other The fragile ordering between marking commands

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error handler when final completions race against each other The fragile ordering between marking commands completed or failed so that the error handler only wakes when the last running command completes or times out has race conditions. These race conditions can cause the SCSI layer to fail to wake the error handler, leaving I/O through the SCSI host stuck as the error state cannot advance. First, there is an memory ordering issue within scsi_dec_host_busy(). The write which clears SCMD_STATE_INFLIGHT may be reordered with reads counting in scsi_host_busy(). While the local CPU will see its own write, reordering can allow other CPUs in scsi_dec_host_busy() or scsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to see a host busy equal to the host_failed count. This race condition can be prevented with a memory barrier on the error path to force the write to be visible before counting host busy commands. Second, there is a general ordering issue with scsi_eh_inc_host_failed(). By counting busy commands before incrementing host_failed, it can race with a final command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does not see host_failed incremented but scsi_eh_inc_host_failed() counts busy commands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(), resulting in neither waking the error handler task. This needs the call to scsi_host_busy() to be moved after host_failed is incremented to close the race condition.

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.10.249, < 6.1.162, < 6.6.122, < 6.12.68, < 6.18.8

References

  • https://git.kernel.org/stable/c/219f009ebfd1ef3970888ee9eef4c8a06357f862(Patch)
  • https://git.kernel.org/stable/c/64ae21b9c4f0c7e60cf47a53fa7ab68852079ef0(Patch)
  • https://git.kernel.org/stable/c/6d9a367be356101963c249ebf10ea10b32886607(Patch)
  • https://git.kernel.org/stable/c/9fdc6f28d5e81350ab1d2cac8389062bd09e61e1(Patch)
  • https://git.kernel.org/stable/c/cc872e35c0df80062abc71268d690a2f749e542e(Patch)
  • https://git.kernel.org/stable/c/fe2f8ad6f0999db3b318359a01ee0108c703a8c3(Patch)

Related News (2 articles)

Tier A
Microsoft MSRC4d ago
CVE-2026-23110 scsi: core: Wake up the error handler when final completions race against each other
→ No new info (linked only)
Tier B
CERT-FR5d ago
Multiples vulnérabilités dans le noyau Linux de SUSE (20 mars 2026)
→ No new info (linked only)
CVSS 3.14.7 MEDIUM
VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited❌ No
CWECWE-362
Published2/4/2026
Last enriched4h ago
Trending Score15
Source articles2
Independent2
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%