Description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: Don't log keys in SMB3 signing and encryption key generation

When KSMBD_DEBUG_AUTH logging is enabled, generate_smb3signingkey() and
generate_smb3encryptionkey() log the session, signing, encryption, and
decryption key bytes. Remove the logs to avoid exposing credentials.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux ksmbd daemon caused sensitive SMB3 signing and encryption keys to be written to kernel logs when the KSMBD_DEBUG_AUTH flag was set. Because the keys were logged in clear text, any party that could read the logs – such as a local user with sufficient privileges or an attacker who gained read access to the log files – could capture the cryptographic material used to sign or encrypt SMB traffic. With those keys, the attacker could forge SMB messages, impersonate a legitimate server or client, or decrypt traffic between peers, thereby compromising confidentiality and potentially enabling further attacks. The weaknesses include improper handling of sensitive information and improper logging of cryptographic material.

Affected Systems

Any Linux kernel that includes ksmbd and has the KSMBD_DEBUG_AUTH logging option enabled is potentially affected. The reference patches in the supplied git URLs remove the logging of key bytes, so older kernel versions that have not yet applied these changes remain vulnerable. No explicit version range is listed, so the safest assumption is that all builds prior to the commits referenced should be treated as vulnerable.

Risk and Exploitability

The vulnerability requires that the attacker be able to read kernel logs that contain the sensitive bytes. This is typically a local privilege vulnerability, or a remote one only if the logs are exposed to a network or otherwise accessible. No remote execution or denial‑of‑service vector is disclosed. The EPSS score is not provided, and the vulnerability is not in the CISA KEV catalog, suggesting limited exploitation activity to date. The risk, however, remains high for environments using debug logging, as captured keys can be used to undermine SMB security.

Generated by OpenCVE AI on May 9, 2026 at 04:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a kernel version that contains the patch removing key logging
  • Disable the KSMBD_DEBUG_AUTH logging option so that signing and encryption keys are no longer written to logs
  • Restrict read access to kernel log files and configure log rotation or audit rules to prevent accidental exposure

Generated by OpenCVE AI on May 9, 2026 at 04:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 03:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: Don't log keys in SMB3 signing and encryption key generation When KSMBD_DEBUG_AUTH logging is enabled, generate_smb3signingkey() and generate_smb3encryptionkey() log the session, signing, encryption, and decryption key bytes. Remove the logs to avoid exposing credentials.
Title ksmbd: Don't log keys in SMB3 signing and encryption key generation
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:26.618Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.877

Modified: 2026-05-08T15:16:48.877

Link: CVE-2026-43377

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43377 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:00:10Z

Weaknesses