CVE-2026-43376

medium Red Hat
EPSS Score
0.0%
Exploitation probability in 30 days
Top 95% most likely to be exploited
Published: May 8, 2026 (6 days ago)
Last Modified: May 8, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in ksmbd in the Linux kernel. The `oplock_info` structure is immediately freed using `kfree()` without an RCU (Read-Copy-Update) grace period, even though it can still be accessed by readers. This improper memory deallocation can lead to a use-after-free vulnerability, particularly in the `opinfo_get()` function, where operations are performed on already freed memory. A local attacker could potentially exploit this to cause system instability or a denial of service.

CWE

CWE-763

Affected Products

Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9

References