5.5

CVE-2026-23228

In the Linux kernel, the following vulnerability has been resolved:

smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()

On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is
freed via free_transport(), which does not decrement active_num_conn,
leaking this counter.

Replace free_transport() with ksmbd_tcp_disconnect().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 5.15.91 < 5.15.201
LinuxLinux Kernel Version >= 6.1.9 < 6.1.164
LinuxLinux Kernel Version >= 6.2.1 < 6.6.125
LinuxLinux Kernel Version >= 6.7 < 6.12.72
LinuxLinux Kernel Version >= 6.13 < 6.18.11
LinuxLinux Kernel Version >= 6.19 < 6.19.1
LinuxLinux Kernel Version6.2 Update-
LinuxLinux Kernel Version6.2 Updaterc6
LinuxLinux Kernel Version6.2 Updaterc7
LinuxLinux Kernel Version6.2 Updaterc8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.05
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-401 Missing Release of Memory after Effective Lifetime

The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.