Impact
In the Linux kernel's ksmbd SMB service, a use‑after‑free flaw was discovered. When a session disconnects without a SMB2_LOGOFF, a durable file handle remains associated with a NULL connection pointer and leaves byte‑range lock entries dangling. The subsequent durable scavenger thread attempts to clean up those locks while the connection object has already been freed, causing a slab use‑after‑free vulnerability that can lead to kernel memory corruption or code execution. The flaw is a classic use‑after‑free (CWE‑825).
Affected Systems
This issue affects any Linux distribution that ships with the ksmbd kernel module and has not applied the patch referenced by the provided Git commits. No specific kernel version list is disclosed, so all current kernels that include the vulnerable ksmbd code may be impacted. The patch is included in the kernel source; therefore vendor kernel updates that incorporate the Git commit should remediate the problem.
Risk and Exploitability
The CVSS score is not available, but the EPSS score is not reported and KEV does not list this vulnerability, indicating no detected exploitation at present. Nonetheless, use‑after‑free in kernel space can enable remote code execution if an attacker can interact with the SMB service. The likely attack vector is a remote SMB client providing a durable session that later times out while attempting to close the file descriptor. Because this flaw can corrupt kernel memory, the impact is high, and systems running ksmbd should prioritize applying the patched kernel.
OpenCVE Enrichment