CVE-2026-23230

In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open, has_lease and on_list are stored in the same bitfield byte in struct cached_fid but are updated in different code paths that may run concurrently. Bitfield assignments generate byte read–modify–write operations (e.g. `orb $mask, addr` on x86_64), so updating one flag can restore stale values of the others. A possible interleaving is: CPU1: load old byte (has_lease=1, on_list=1) CPU2: clear both flags (store 0) CPU1: RMW store (old | IS_OPEN) -> reintroduces cleared bits To avoid this class of races, convert these flags to separate bool fields.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

17 Mar 2026, 21:22

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/3eaa22d688311c708b73f3c68bc6d0c8e3f0f77a - () https://git.kernel.org/stable/c/3eaa22d688311c708b73f3c68bc6d0c8e3f0f77a - Patch
References () https://git.kernel.org/stable/c/4386f6af8aaedd0c5ad6f659b40cadcc8f423828 - () https://git.kernel.org/stable/c/4386f6af8aaedd0c5ad6f659b40cadcc8f423828 - Patch
References () https://git.kernel.org/stable/c/4cfa4c37dcbcfd70866e856200ed8a2894cac578 - () https://git.kernel.org/stable/c/4cfa4c37dcbcfd70866e856200ed8a2894cac578 - Patch
References () https://git.kernel.org/stable/c/569fecc56bfe4df66f05734d67daef887746656b - () https://git.kernel.org/stable/c/569fecc56bfe4df66f05734d67daef887746656b - Patch
References () https://git.kernel.org/stable/c/c4b9edd55987384a1f201d3d07ff71e448d79c1b - () https://git.kernel.org/stable/c/c4b9edd55987384a1f201d3d07ff71e448d79c1b - Patch
References () https://git.kernel.org/stable/c/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 - () https://git.kernel.org/stable/c/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 - Patch

23 Feb 2026, 04:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 -
Summary
  • (es) Se ha resuelto la siguiente vulnerabilidad en el kernel de Linux: smb: cliente: dividir los campos de bits de cached_fid para evitar condiciones de carrera RMW de bytes compartidos is_open, has_lease y on_list se almacenan en el mismo byte de campo de bits en la estructura cached_fid, pero se actualizan en diferentes rutas de código que pueden ejecutarse concurrentemente. Las asignaciones de campos de bits generan operaciones de lectura-modificación-escritura de bytes (p. ej., 'orb $mask, addr' en x86_64), por lo que al actualizar una bandera (flag) se puede restaurar valores obsoletos de las otras. Una posible intercalación es: CPU1: carga el byte antiguo (has_lease=1, on_list=1) CPU2: borra ambas banderas (almacena 0) CPU1: almacena RMW (old | IS_OPEN) -> reintroduce los bits borrados Para evitar esta clase de condiciones de carrera, hay que convertir estas banderas a campos bool separados.

19 Feb 2026, 16:27

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/569fecc56bfe4df66f05734d67daef887746656b -

18 Feb 2026, 16:22

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 16:22

Updated : 2026-03-17 21:22


NVD link : CVE-2026-23230

Mitre link : CVE-2026-23230

CVE.ORG link : CVE-2026-23230


JSON object : View

Products Affected

linux

  • linux_kernel