Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Linux Kernel: Unprotected Data Access in ksmbd Can Cause Data Loss
Summary
A vulnerability in the Linux kernel's ksmbd system affects the integrity of data in multi-channel sessions. If not addressed, it could lead to data loss. To protect against this issue, update to the latest Linux kernel version.
What to do
- Update linux kernel to version 6.19.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| linux | kernel | > 6.19.0 , <= 6.19.1 | 6.19.1 |
Original title
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
Original description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).
Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in
multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del).
Adds rw_semaphore chann_lock to struct ksmbd_session and protects
all xa_load/xa_store/xa_erase accesses.
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git Product
- https://git.kernel.org/stable/c/36ef605c0395b94b826a8c8d6f2697071173de6e URL
- https://git.kernel.org/stable/c/4f3a06cc57976cafa8c6f716646be6c79a99e485 URL
- https://git.kernel.org/stable/c/e4a8a96a93d08570e0405cfd989a8a07e5b6ff33 URL
- https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23226... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-23226 Vendor Advisory
Published: 18 Feb 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026