CVE-2026-23230

CWE-8218 documents8 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 93.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open, has_lease and on_list are stored in the same bitfield byte in struct cached_fid but are updated in different code paths that may run concurrently. Bitfield assignments generate byte read–modify–write operations (e.g. `orb $mask, addr` on x86_64), so updating one flag can restore stale values of the others. A possible interleaving is: CPU1: load ol

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel6.16.1.164+4
CVEListV5linux/linuxebe98f1447bbccf8228335c62d86af02a0ed23f7569fecc56bfe4df66f05734d67daef887746656b+6
Debianlinux< 6.1.164-1+2
Debianlinux-6.1< 6.1.164-1~deb11u1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23230: In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open, ha2026-02-18
GHSA
GHSA-p68h-c56f-p3v6: In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open,2026-02-18
CVEList
smb: client: split cached_fid bitfields to avoid shared-byte RMW races2026-02-18

📋Vendor Advisories

3
Red Hat
kernel: Linux kernel: Denial of Service in SMB client due to race condition2026-02-18
Microsoft
smb: client: split cached_fid bitfields to avoid shared-byte RMW races2026-02-10
Debian
CVE-2026-23230: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23230 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23230 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io