PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-43376 Git CVE debrief

CVE-2026-43376 is a critical Linux kernel vulnerability in ksmbd where oplock_info could be freed immediately with kfree() even though it is still accessed in RCU read-side sections. That creates a use-after-free risk, including in opinfo_get() and proc_show_files(). The published fix switches to deferred reclamation with call_rcu(), allowing a grace period before memory is released. This CVE was published on 2026-05-08 and updated on 2026-05-11.

Vendor
Git
Product
Unknown
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-08
Original CVE updated
2026-05-11
Advisory published
2026-05-08
Advisory updated
2026-05-11

Who should care

Linux kernel maintainers, distribution security teams, and operators running ksmbd-enabled systems should treat this as high priority. Any environment exposing SMB services through ksmbd should review patch status and release notes promptly.

Technical summary

The issue is a lifetime-management bug in ksmbd’s oplock_info handling. The code path nullifies the pointer and frees memory immediately, but readers in RCU critical sections may still dereference the object after the free. The CVE description specifically calls out opinfo_get(), where atomic_inc_not_zero() may run against already freed memory. The fix is to replace immediate kfree() with call_rcu() so the object is released only after an RCU grace period.

Defensive priority

Critical. The CVSS vector provided by the source is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8), which indicates a remotely reachable, low-complexity issue with severe confidentiality, integrity, and availability impact potential.

Recommended defensive actions

  • Verify whether your kernel build includes the ksmbd fix that switches oplock_info cleanup to call_rcu().
  • Prioritize patching or upgrading any systems that expose ksmbd-based SMB service.
  • Check vendor advisories and downstream kernel packaging notes for backported fixes.
  • If immediate patching is not possible, reduce exposure of ksmbd services to trusted networks only and monitor for abnormal SMB-related kernel behavior.
  • Track the official CVE and NVD records for any updated affected-version guidance or downstream remediation details.

Evidence notes

All statements above are derived from the provided CVE description, its CVSS vector, the published and modified timestamps, and the NVD-listed kernel.org stable commit references. No affected-version range was asserted because it was not present in the supplied corpus. No exploitability claims beyond the CVSS vector and CVE text were added.

Official resources

Publicly disclosed on 2026-05-08 and updated on 2026-05-11. Timing context in this debrief uses the CVE published and modified timestamps supplied in the source corpus.