Description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: add chann_lock to protect ksmbd_chann_list xarray

ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).

Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
Published: 2026-02-18
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Linux kernel’s SMB daemon, ksmbd, contains an unsynchronized access to the ksmbd_chann_list xarray. When a channel is looked up with lookup_chann_list() and then deleted with ksmbd_chann_del(), the xarray may be freed while the lookup still holds a reference, causing a use‑after‑free. This memory corruption can allow an attacker who can influence SMB channel creation to execute arbitrary code in kernel space, potentially escalating privileges or causing a kernel panic. The fix introduces a read‑write semaphore, chann_lock, to serialize all xa_load/xa_store/xa_erase operations and eliminate the race.

Affected Systems

The vulnerability affects the Linux kernel, specifically the ksmbd SMB daemon present in all distributions that ship a kernel containing this module. No specific version range is provided, but the issue was resolved in recent kernel commits, so any kernel built from those commits onward is protected.

Risk and Exploitability

The flaw carries a high CVSS score of 8.8 yet has an EPSS score below 1%, indicating a low current exploitation probability. It is not listed in the CISA KEV catalog. Inferred from the affected component, the attack vector is likely remote via SMB or local through privileged processes that can create SMB channels. Because there is no official workaround, the only viable mitigation is to apply the kernel update or disable the affected service.

Generated by OpenCVE AI on April 15, 2026 at 15:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the system kernel to a version that includes the ksmbd chann_lock fix (e.g., the kernel commits referenced in the advisory); reboot after the update.
  • If an immediate kernel upgrade is not possible, disable the ksmbd SMB service or restrict it to trusted users so that no SMB channels can be created.
  • Monitor system logs for kernel panic or abnormal ksmbd activity and configure alerts for memory‑corruption or use‑after‑free indicators.

Generated by OpenCVE AI on April 15, 2026 at 15:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 13 Mar 2026 17:00:00 +0000


Mon, 02 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Feb 2026 03:30:00 +0000


Thu, 19 Feb 2026 00:15:00 +0000


Wed, 18 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase accesses.
Title ksmbd: add chann_lock to protect ksmbd_chann_list xarray
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:42.071Z

Reserved: 2026-01-13T15:37:45.987Z

Link: CVE-2026-23226

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-18T16:22:32.363

Modified: 2026-04-02T15:16:23.970

Link: CVE-2026-23226

cve-icon Redhat

Severity :

Publid Date: 2026-02-18T00:00:00Z

Links: CVE-2026-23226 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses