CVE-2026-23228

high

Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is freed via free_transport(), which does not decrement active_num_conn, leaking this counter. Replace free_transport() with ksmbd_tcp_disconnect().

References

https://git.kernel.org/stable/c/cd25e0d809531a67e9dd53b19012d27d2b13425f

https://git.kernel.org/stable/c/baf664fc90a6139a39a58333e4aaa390c10d45dc

https://git.kernel.org/stable/c/7ddd69cd1338c6197e1b6b19cec60d99c8633e4f

https://git.kernel.org/stable/c/787769c8cc50416af7b8b1a36e6bcd6aaa7680aa

https://git.kernel.org/stable/c/6dd2645cf080a75be31fa66063c7332b291f46f0

https://git.kernel.org/stable/c/599271110c35f6b16e2e4e45b9fbd47ed378c982

Details

Source: Mitre, NVD

Published: 2026-02-18

Updated: 2026-02-19

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018