Impact
The flaw arises from storing several flag bits in a single byte of the cached_fid structure within the Linux SMB client. Concurrent code paths modify these bits separately, causing read‑modify‑write races that can inadvertently restore stale flag values. This race can leave the SMB client in an incorrect, inconsistent state, leading to data corruption, service interruption, or loss of synchronization with the SMB server.
Affected Systems
All Linux kernel releases that include the unpatched SMB client implementation. No specific version range is listed, but any kernel that has not incorporated the latest commit that splits the bitfields into individual boolean members is vulnerable.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity vulnerability. The EPSS score is below 1%, suggesting low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires concurrent execution of the conflicting code paths in the SMB client, typically achievable by a local user with permissions to run SMB client operations. While it does not provide arbitrary code execution, the race condition can disrupt client operations and degrade service availability.
OpenCVE Enrichment
Debian DLA
Debian DSA