ksmbd: Don't log keys in SMB3 signing and encryption key generation

Summary

CVECVE-2026-43377
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-08 15:16:48 UTC
Updated2026-05-11 08:16:12 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: ksmbd: Don't log keys in SMB3 signing and encryption key generation When KSMBD_DEBUG_AUTH logging is enabled, generate_smb3signingkey() and generate_smb3encryptionkey() log the session, signing, encryption, and decryption key bytes. Remove the logs to avoid exposing credentials.

Risk And Classification

Primary CVSS: v3.1 8.1 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS: 0.000140000 probability, percentile 0.027310000 (date 2026-05-10)


VersionSourceTypeScoreSeverityVector
3.1416baaa9-dc9f-4396-8d5f-8c081fb06d67Secondary8.1HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.1CNADECLARED8.1HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS v3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 4084ed720d7d5f4e975c9e4a6267a552dad3b24a git Not specified
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 fec5c70b82af3f59f15bb984df94e5ad1fccfb1e git Not specified
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 3fe2d9ec166b7df9a8df6c0fdcfc210572e27e3f git Not specified
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 407cc37c21d51f9b9d4d20204b04890880cfa6ae git Not specified
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 c6b01b997a2094969e315f1ebfc1d64b8ae2163d git Not specified
CNA Linux Linux affected e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 441336115df26b966575de56daf7107ed474faed git Not specified
CNA Linux Linux affected 5.15 Not specified
CNA Linux Linux unaffected 5.15 semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.20 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.9 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/fec5c70b82af3f59f15bb984df94e5ad1fccfb1e 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/4084ed720d7d5f4e975c9e4a6267a552dad3b24a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/407cc37c21d51f9b9d4d20204b04890880cfa6ae 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c6b01b997a2094969e315f1ebfc1d64b8ae2163d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/441336115df26b966575de56daf7107ed474faed 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/3fe2d9ec166b7df9a8df6c0fdcfc210572e27e3f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report