LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-43379

CVE-2026-43379 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: May 11, 2026

Linux kernel - Use After Free

Published: May 8, 2026Updated: May 11, 2026Remote Exploitable

Overview

Linux kernel contains a use-after-free vulnerability caused by accessing opinfo pointer after rcu_read_unlock() in ksmbd smb_lazy_parent_lease_break_close(), letting attackers cause memory corruption or system crash, exploit requires concurrent access.

Severity & Score

Severity: Critical
CVSS Score: 9.8

Impact

Attackers can cause memory corruption or system crash, potentially leading to denial of service or code execution.

Mitigation

Update to the latest Linux kernel version with the fix applied.

Details

CVE ID
CVE-2026-43379
Severity
Critical
CVSS Score
9.8
Type
use_after_free
Status
new

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H