Linux Kernel kSMBD UseAfterFree via Unsynchronized xarray
CVE-2026-23226 Published on February 18, 2026

ksmbd: add chann_lock to protect ksmbd_chann_list xarray
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase accesses.

NVD


Products Associated with CVE-2026-23226

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2026-23226 are published in Linux Kernel:

 

Affected Versions

Linux: Linux:

Exploit Probability

EPSS
0.02%
Percentile
4.53%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.