Description
This CVE ID has been rejected or withdrawn.
Published: 2026-05-12
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title kernel: ksmbd: Linux ksmbd: Privilege Escalation via crafted DACL in ACL inheritance
Weaknesses CWE-805
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 13 May 2026 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


Wed, 13 May 2026 15:15:00 +0000

Type Values Removed Values Added
Description Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients with directory creation permissions to trigger a heap out-of-bounds read and subsequent heap corruption by setting a crafted DACL with a malformed SID containing an inflated num_subauth field. Attackers can exploit this vulnerability by creating a directory, setting the malicious DACL via SMB2_SET_INFO, and creating child entries to cause kernel instability, denial of service, or potentially achieve privilege escalation to kernel code execution. This CVE ID has been rejected or withdrawn.
Title Linux ksmbd Remote Memory Corruption via ACL Inheritance
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X'}


Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux ksmbd
Vendors & Products Linux
Linux ksmbd

Tue, 12 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description Linux ksmbd contains a remote memory corruption vulnerability in the ACL inheritance path that allows remote clients with directory creation permissions to trigger a heap out-of-bounds read and subsequent heap corruption by setting a crafted DACL with a malformed SID containing an inflated num_subauth field. Attackers can exploit this vulnerability by creating a directory, setting the malicious DACL via SMB2_SET_INFO, and creating child entries to cause kernel instability, denial of service, or potentially achieve privilege escalation to kernel code execution.
Title Linux ksmbd Remote Memory Corruption via ACL Inheritance
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: REJECTED

Assigner: VulnCheck

Published:

Updated: 2026-05-13T15:14:52.974Z

Reserved: 2026-05-12T21:15:19.856Z

Link: CVE-2026-8449

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2026-05-12T22:16:38.730

Modified: 2026-05-13T16:17:05.807

Link: CVE-2026-8449

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-12T21:34:59Z

Links: CVE-2026-8449 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:35:23Z

Weaknesses