CVE-2026-31718 PUBLISHED

ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger

When a durable file handle survives session disconnect (TCP close without SMB2_LOGOFF), session_fd_check() sets fp->conn = NULL to preserve the handle for later reconnection. However, it did not clean up the byte-range locks on fp->lock_list.

Later, when the durable scavenger thread times out and calls __ksmbd_close_fd(NULL, fp), the lock cleanup loop did:

<pre>spin_lock(&fp->conn->llist_lock); </pre>

This caused a slab use-after-free because fp->conn was NULL and the original connection object had already been freed by ksmbd_tcp_disconnect().

The root cause is asymmetric cleanup: lock entries (smb_lock->clist) were left dangling on the freed conn->lock_list while fp->conn was nulled out.

To fix this issue properly, we need to handle the lifetime of smb_lock->clist across three paths: - Safely skip clist deletion when list is empty and fp->conn is NULL. - Remove the lock from the old connection's lock_list in session_fd_check() - Re-add the lock to the new connection's lock_list in ksmbd_reopen_durable_fd().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to e33c65f011980b4ad4abfd93585ec2079856368f (excl.)
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to 3d6682726c2d3a46d31dae88b8166786b09b03ad (excl.)
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to b34fc42cfe922e551f7a27d3ac3bb016e41d7dd9 (excl.)
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to 235e32320a470fcd3998fb3774f2290a0eb302a1 (excl.)
  • Version 8df4bcdb0a4232192b2445256c39b787d58ef14d is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.9 is affected
  • unaffected from 0 to 6.9 (excl.)
  • unaffected from 6.12.84 to 6.12.* (incl.)
  • unaffected from 6.18.25 to 6.18.* (incl.)
  • unaffected from 7.0.2 to 7.0.* (incl.)
  • unaffected from 7.1-rc1 to * (incl.)

References