Impact
The vulnerability exists in the Linux kernel’s SMB client where the logic for handling receive credits uses a counter that is subject to a race between credit granting and credit consumption by the peer. The race condition arises because the code may grant credits that have already been consumed, creating a window where the server can be asked to provide more data than it authorized. Based on the description, it is inferred that this improper credit accounting could allow an attacker to cause the client to misbehave, potentially leading to a denial of service or other operational disruption. The weakness is identified as CWE-367, a race condition.
Affected Systems
Affected systems include any machine running a Linux kernel that incorporates the SMB client code before the kernel commit that introduced a dedicated counter for available credits. No specific kernel version numbers are listed, so essentially every Linux installation that has not yet applied the fix is potentially impacted.
Risk and Exploitability
The CVSS score of 4.7 indicates medium severity. The EPSS score is under 1%, showing a very low probability of exploitation at the time of this analysis. The vulnerability is not listed in CISA KEV. Based on the nature of this race, it is inferred that an attacker would need to send carefully timed SMB traffic to trigger the race window; practical exploitation would therefore require precise coordination, making attacks difficult but not theoretically impossible. Overall the risk remains significant due to potential service disruption, but the likelihood of exploitation is low.
OpenCVE Enrichment