PatchSiren cyber security CVE debrief
CVE-2026-43376 Git CVE debrief
CVE-2026-43376 is a critical Linux kernel vulnerability in ksmbd where oplock_info could be freed immediately with kfree() even though it is still accessed in RCU read-side sections. That creates a use-after-free risk, including in opinfo_get() and proc_show_files(). The published fix switches to deferred reclamation with call_rcu(), allowing a grace period before memory is released. This CVE was published on 2026-05-08 and updated on 2026-05-11.
- Vendor
- Git
- Product
- Unknown
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-11
Who should care
Linux kernel maintainers, distribution security teams, and operators running ksmbd-enabled systems should treat this as high priority. Any environment exposing SMB services through ksmbd should review patch status and release notes promptly.
Technical summary
The issue is a lifetime-management bug in ksmbd’s oplock_info handling. The code path nullifies the pointer and frees memory immediately, but readers in RCU critical sections may still dereference the object after the free. The CVE description specifically calls out opinfo_get(), where atomic_inc_not_zero() may run against already freed memory. The fix is to replace immediate kfree() with call_rcu() so the object is released only after an RCU grace period.
Defensive priority
Critical. The CVSS vector provided by the source is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8), which indicates a remotely reachable, low-complexity issue with severe confidentiality, integrity, and availability impact potential.
Recommended defensive actions
- Verify whether your kernel build includes the ksmbd fix that switches oplock_info cleanup to call_rcu().
- Prioritize patching or upgrading any systems that expose ksmbd-based SMB service.
- Check vendor advisories and downstream kernel packaging notes for backported fixes.
- If immediate patching is not possible, reduce exposure of ksmbd services to trusted networks only and monitor for abnormal SMB-related kernel behavior.
- Track the official CVE and NVD records for any updated affected-version guidance or downstream remediation details.
Evidence notes
All statements above are derived from the provided CVE description, its CVSS vector, the published and modified timestamps, and the NVD-listed kernel.org stable commit references. No affected-version range was asserted because it was not present in the supplied corpus. No exploitability claims beyond the CVSS vector and CVE text were added.
Official resources
-
CVE-2026-43376 CVE record
CVE.org
-
CVE-2026-43376 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Publicly disclosed on 2026-05-08 and updated on 2026-05-11. Timing context in this debrief uses the CVE published and modified timestamps supplied in the source corpus.