SB20260325151 - Use After Free in Linux kernel scsi pm8001 driver



SB20260325151 - Use After Free in Linux kernel scsi pm8001 driver

Published: March 25, 2026

Security Bulletin ID SB20260325151
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use After Free (CVE-ID: CVE-2026-23306)

The vulnerability allows a local user to execute arbitrary code and escalate privileges.

The vulnerability exists due to a use-after-free in the pm8001_queue_command() function in the SCSI subsystem when handling SCSI commands during a phy down or device gone state. A local user can trigger a double free by issuing a command that leads to the erroneous return of -ENODEV after the task has already been freed, resulting in memory corruption that could lead to arbitrary code execution or privilege escalation.

The vulnerability specifically affects the pm8001 SAS controller driver and requires the ability to issue SCSI commands, which is typically available to local users with access to storage devices.


Remediation

Install update from vendor's website.