Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Linux ksmbd: Data Corruption in Multi-Channel Sessions
CVE-2026-23226
Summary
A Linux kernel vulnerability in ksmbd can cause data corruption when multiple sessions are active, potentially leading to data loss. This issue affects systems using the Linux kernel's ksmbd implementation, which is used for SMB (file sharing) services. An update is available to resolve this issue and prevent data corruption.
What to do
- Update linux kernel to version 6.19.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| linux | kernel | > 6.19.0 , <= 6.19.1 | 6.19.1 |
Original title
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
Original description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).
Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).
Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git Product
- https://git.kernel.org/stable/c/36ef605c0395b94b826a8c8d6f2697071173de6e URL
- https://git.kernel.org/stable/c/4f3a06cc57976cafa8c6f716646be6c79a99e485 URL
- https://git.kernel.org/stable/c/e4a8a96a93d08570e0405cfd989a8a07e5b6ff33 URL
- https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23226... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23226 Vendor Advisory
Published: 18 Feb 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026