Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux ksmbd: Data Corruption in Multi-Channel Sessions

CVE-2026-23226
Summary

A Linux kernel vulnerability in ksmbd can cause data corruption when multiple sessions are active, potentially leading to data loss. This issue affects systems using the Linux kernel's ksmbd implementation, which is used for SMB (file sharing) services. An update is available to resolve this issue and prevent data corruption.

What to do
  • Update linux kernel to version 6.19.1.
Affected software
VendorProductAffected versionsFix available
linux kernel > 6.19.0 , <= 6.19.1 6.19.1
Original title
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
Original description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: add chann_lock to protect ksmbd_chann_list xarray

ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).

Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
Published: 18 Feb 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026