Impact
The ksmbd SMB server contains a flaw in smb_check_perm_dacl() where the size of Access Control Entries (ACEs) is insufficiently validated. An attacker with the ability to set a custom ACL on a file they own can craft an ACE whose declared size is only the 4‑byte header. The function’s checks then succeed, but subsequent reads of fields beyond the real end of the ACE (the access request and SID structures) trigger an out‑of‑bounds read. This read can corrupt kernel memory, which may result in a crash or other unreliable system behavior. The vulnerability does not directly leak data and is not pre‑authentication; however, kernel state corruption is possible, and the KASAN detector may report the fault.
Affected Systems
Any Linux kernel containing the ksmbd SMB implementation prior to the patch that introduced stricter ACE size validation is affected. The issue spans all configurations that enable smbfs and process ACLs for SMB shares; no specific distribution version is singled out, so any kernel version before the recent commit is considered vulnerable.
Risk and Exploitability
The flaw is not listed in the CISA KEV catalog and EPSS score is < 1%, with a CVSS score of 8.3. Reachability requires an authenticated SMB client that can modify the ACL on a file they own. After the ACL is stored, a subsequent CREATE operation on that file causes the kernel to walk the stored DACL and trigger the out‑of‑bounds read, potentially leading to kernel memory corruption or a crash. Because the vulnerability does not provide a direct data exfiltration path, the primary risk is system instability and possible denial of service. The likelihood of exploitation is uncertain, but the potential impact on availability and integrity is significant.
OpenCVE Enrichment