Home

Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7 (git) before 6968c91fab05b8fc4d6700e0cf34472bb422df25
affected

79242e7b6bc63efec28b7c235bc320806afce6c0 (git) before 2ba03f46132b0d1a7bafb86e1ef61951a2254023
affected

34abd408c8ba24d7c97bd02ba874d8c714f49db1 (git) before 830de6eeb9db4cb7e758201fb99328ef4ca4b032
affected

34abd408c8ba24d7c97bd02ba874d8c714f49db1 (git) before 84ff995ae826aa6bbcc6c7b9ea569ff67c021d72
affected

Default status
affected

7.0
affected

Any version before 7.0
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/6968c91fab05b8fc4d6700e0cf34472bb422df25

git.kernel.org/...c/2ba03f46132b0d1a7bafb86e1ef61951a2254023

git.kernel.org/...c/830de6eeb9db4cb7e758201fb99328ef4ca4b032

git.kernel.org/...c/84ff995ae826aa6bbcc6c7b9ea569ff67c021d72

cve.org (CVE-2026-31608)

nvd.nist.gov (CVE-2026-31608)

Download JSON