CVE-2026-23228

medium

Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is freed via free_transport(), which does not decrement active_num_conn, leaking this counter. Replace free_transport() with ksmbd_tcp_disconnect().

References

https://git.kernel.org/stable/c/cd25e0d809531a67e9dd53b19012d27d2b13425f

https://git.kernel.org/stable/c/baf664fc90a6139a39a58333e4aaa390c10d45dc

https://git.kernel.org/stable/c/7ddd69cd1338c6197e1b6b19cec60d99c8633e4f

https://git.kernel.org/stable/c/787769c8cc50416af7b8b1a36e6bcd6aaa7680aa

https://git.kernel.org/stable/c/77ffbcac4e569566d0092d5f22627dfc0896b553

https://git.kernel.org/stable/c/6dd2645cf080a75be31fa66063c7332b291f46f0

https://git.kernel.org/stable/c/599271110c35f6b16e2e4e45b9fbd47ed378c982

Details

Source: Mitre, NVD

Published: 2026-02-18

Updated: 2026-03-18

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018