PT-2026-41267 · Linux · Linux Kernel
Published
2026-05-15
·
Updated
2026-05-15
·
CVE-2026-43490
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
In the ksmbd module, the
smb inherit dacl() function fails to verify that the variable-length Security Identifier (SID) described by sid.num subauth is fully contained within the Access Control Entry (ACE). A malformed inheritable ACE can advertise more subauthorities than are present, potentially causing compare sids() to read past the ACE. Additionally, smb set ace() uses an unchecked source SID count to compute the inherited ACE size, which may advance the temporary inherited ACE buffer pointer and nt size accounting beyond the allocated buffer.Recommendations
Validate the parent ACE SID count and SID length before using the SID during inheritance.
Compute the inherited ACE size from the copied SID to ensure the size matches the bounded destination SID.
Reject the inherited Discretionary Access Control List (DACL) if size accumulation would overflow
smb acl.size or the security descriptor allocation size. Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel