Description
In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix oops due to uninitialised var in smb2_unlink()

If SMB2_open_init() or SMB2_close_init() fails (e.g. reconnect), the
iovs set @rqst will be left uninitialised, hence calling
SMB2_open_free(), SMB2_close_free() or smb2_set_related() on them will
oops.

Fix this by initialising @close_iov and @open_iov before setting them
in @rqst.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An uninitialized variable in the SMB2 client’s unlink operation can trigger a kernel Oops, resulting in a system crash. The flaw arises because iovs set by SMB2_open_init or SMB2_close_init may be left uninitialized when those calls fail, such as during a reconnect. When smb2_unlink() then attempts to free or modify these uninitialized I/O vectors, the kernel panics. This weakness combines use‑of‑uninitialized data (CWE‑824) with improper resource cleanup (CWE‑908), causing a denial of service in the form of a kernel crash.

Affected Systems

The vulnerability exists in the Linux kernel SMB client code before the inclusion of commit 048efe12. Kernels released prior to 6.17 and early 7.0 RC releases (rc1 and rc2) contain the uncorrected logic. Any Linux distribution running an unpatched kernel with SMB client capability enabled is affected, regardless of the distribution vendor.

Risk and Exploitability

The CVSS score of 5.5 denotes a medium severity, while the EPSS score below 1 % indicates a very low likelihood of real‑world exploitation at present. The vulnerability is not listed in the CISA KEV catalog, further reducing the observed threat level. The likely attack vector is remote, via malicious or misconfigured SMB traffic that forces the SMB client to experience a reconnection failure, but it could also be triggered locally by simulating such failures. Based on the description, the exact exploitation method is not detailed and is inferred from the kernel behavior.

Generated by OpenCVE AI on May 22, 2026 at 02:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes commit 048efe12 or newer, such as kernel 6.17 and later releases.
  • If a kernel upgrade cannot be performed immediately, restrict or disable SMBv2/Samba client operations on the affected hosts to reduce exposure to the vulnerable code path.
  • Regularly inspect system logs for "Oops" messages or kernel panic entries related to smb2_unlink to detect any exploitation attempts promptly.

Generated by OpenCVE AI on May 22, 2026 at 02:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 00:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-908
CPEs cpe:2.3:o:linux:linux_kernel:6.17:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-457

Thu, 26 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-457

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: smb: client: fix oops due to uninitialised var in smb2_unlink() If SMB2_open_init() or SMB2_close_init() fails (e.g. reconnect), the iovs set @rqst will be left uninitialised, hence calling SMB2_open_free(), SMB2_close_free() or smb2_set_related() on them will oops. Fix this by initialising @close_iov and @open_iov before setting them in @rqst.
Title smb: client: fix oops due to uninitialised var in smb2_unlink()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:03:51.018Z

Reserved: 2026-01-13T15:37:45.992Z

Link: CVE-2026-23282

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:22.823

Modified: 2026-05-22T00:24:34.460

Link: CVE-2026-23282

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23282 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T02:30:16Z

Weaknesses