Description
In the Linux kernel, the following vulnerability has been resolved:

smb: server: fix use-after-free in smb2_open()

The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is
dereferenced after rcu_read_unlock(), creating a use-after-free
window.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a use‑after‑free in the Linux kernel SMB server. After an SMB open request completes, the server releases an RCU read lock while still holding a reference to a file operation pointer. This race creates a window during which the pointer can be freed and later dereferenced, allowing an attacker who can send crafted SMB traffic to trigger a use‑after‑free that may lead to arbitrary code execution or system crash. Because the flaw resides in the kernel SMB implementation, it can affect any privileged code running on the host that handles SMB requests.

Affected Systems

Affected systems are all Linux distributions that ship a Linux kernel version containing the buggy SMB server implementation. The exact affected kernel versions are not listed in the CVE data, so any system running a kernel prior to the patch that eliminates the use‑after‑free in smb2_open should be considered at risk. The vulnerability is specific to the SMB server component of the Linux kernel.

Risk and Exploitability

The exploit requires the ability to send SMB traffic to the vulnerable server, typically over port 445. An attacker can craft SMB open requests that trigger the use‑after‑free, potentially causing a crash or, if attacker can control the freed memory region, executing arbitrary code with kernel privileges. The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, but the lack of an exploitation mitigation and the kernel‑level nature of the flaw imply a high risk of exploitation if unpatched. The fix removes the pointer dereference after the RCU read lock, eliminating the race.

Generated by OpenCVE AI on May 9, 2026 at 02:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest release that incorporates the smb2_open() use‑after‑free fix;
  • If the kernel cannot be updated immediately, disable the SMB/CIFS server services until the patch is applied;
  • Restrict SMB traffic to trusted hosts only, using firewall rules or network segmentation, to reduce exposure to remote attackers.

Generated by OpenCVE AI on May 9, 2026 at 02:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.
Title smb: server: fix use-after-free in smb2_open()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:43.790Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43378

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.990

Modified: 2026-05-08T15:16:48.990

Link: CVE-2026-43378

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43378 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T03:00:11Z

Weaknesses