Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | kernel: ksmbd: Linux ksmbd: Privilege Escalation via crafted DACL in ACL inheritance | |
| Weaknesses | CWE-805 | |
| References |
|
|
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 13 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients with directory creation permissions to trigger a heap out-of-bounds read and subsequent heap corruption by setting a crafted DACL with a malformed SID containing an inflated num_subauth field. Attackers can exploit this vulnerability by creating a directory, setting the malicious DACL via SMB2_SET_INFO, and creating child entries to cause kernel instability, denial of service, or potentially achieve privilege escalation to kernel code execution. | This CVE ID has been rejected or withdrawn. |
| Title | Linux ksmbd Remote Memory Corruption via ACL Inheritance | |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux ksmbd |
|
| Vendors & Products |
Linux
Linux ksmbd |
Tue, 12 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients with directory creation permissions to trigger a heap out-of-bounds read and subsequent heap corruption by setting a crafted DACL with a malformed SID containing an inflated num_subauth field. Attackers can exploit this vulnerability by creating a directory, setting the malicious DACL via SMB2_SET_INFO, and creating child entries to cause kernel instability, denial of service, or potentially achieve privilege escalation to kernel code execution. | |
| Title | Linux ksmbd Remote Memory Corruption via ACL Inheritance | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: REJECTED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T15:14:52.974Z
Reserved: 2026-05-12T21:15:19.856Z
Link: CVE-2026-8449
No data.
Status : Rejected
Published: 2026-05-12T22:16:38.730
Modified: 2026-05-13T16:17:05.807
Link: CVE-2026-8449
OpenCVE Enrichment
Updated: 2026-05-13T10:35:23Z