Description
In the Linux kernel, the following vulnerability has been resolved:

smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()

On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is
freed via free_transport(), which does not decrement active_num_conn,
leaking this counter.

Replace free_transport() with ksmbd_tcp_disconnect().
Published: 2026-02-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Active Connections Counter Leak
Action: Patch
AI Analysis

Impact

The Linux kernel SMB (ksmbd) server has a memory leak that occurs when the function ksmbd_tcp_new_connection() fails during kthread_run(). In this scenario, the transport object is freed with free_transport(), but the active_num_conn counter is not decremented, causing the counter to grow unchecked. This bug falls under CWE‑401 (Memory Leak) and can lead to incorrect accounting of active SMB connections. If left unresolved, the server may report an inflated number of active connections, potentially refusing new connections or exhausting system resources, which manifests as a denial‑of‑service condition for legitimate clients.

Affected Systems

The vulnerability applies to the Linux kernel’s SMB server (ksmbd) across all kernel versions that shipped the buggy implementation, including the 6.2 release candidates (rc6, rc7, rc8) and older kernels. Vendors affected are the generic Linux kernel maintainers; any distribution using a kernel before the fix will be impacted.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score is less than 1%, implying a very low probability of exploitation and no publicly reported attacks (not listed in the CISA KEV catalog). Based on the description, it is inferred that a malicious SMB client could trigger the failure path, giving attackers a remote attack vector, but no detailed exploitation steps are provided beyond inducing resource exhaustion. Consequently, the main risk is a Denial of Service if an attacker repeatedly induces kthread_run failures, causing the active connection counter to inflate and the server to refuse new connections.

Generated by OpenCVE AI on April 15, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest Linux kernel version that includes the patch replacing free_transport() with ksmbd_tcp_disconnect(), which decrements active_num_conn correctly.
  • Configure the SMB server or underlying system to limit the maximum number of concurrent SMB connections, thereby preventing potential resource exhaustion if the counter continues to rise.
  • Continuously monitor system logs for repeated kthread_run failures and active connection count anomalies, and investigate any configuration or application that may be causing persistent failures.

Generated by OpenCVE AI on April 15, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4499-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6141-1 linux security update
Debian DSA Debian DSA DSA-6163-1 linux security update
History

Wed, 18 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CPEs cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 23 Feb 2026 03:30:00 +0000


Thu, 19 Feb 2026 16:15:00 +0000


Thu, 19 Feb 2026 00:15:00 +0000


Wed, 18 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is freed via free_transport(), which does not decrement active_num_conn, leaking this counter. Replace free_transport() with ksmbd_tcp_disconnect().
Title smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:02:44.471Z

Reserved: 2026-01-13T15:37:45.988Z

Link: CVE-2026-23228

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T16:22:32.580

Modified: 2026-03-18T13:27:53.357

Link: CVE-2026-23228

cve-icon Redhat

Severity :

Publid Date: 2026-02-18T00:00:00Z

Links: CVE-2026-23228 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses