Home

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

cca0526ef2344cab6944d7f441fc24e152da031b (git) before a9940dcbe5cb92482c04efc7341039ddf7dbf607
affected

37b5c06956183b65e6808b509cf637632016cdf7 (git) before 22b7c1c619d808aec4cad3dc42103345e370d107
affected

21538121efe6c8c5b51c742fa02cbe820bc48714 (git) before f9a162c2bbcd0ac85bd07c5b37cf20286048b65c
affected

21538121efe6c8c5b51c742fa02cbe820bc48714 (git) before 27b7c3e916218b5eb2ee350211140e961bfc49be
affected

Default status
affected

7.0
affected

Any version before 7.0
unaffected

6.18.24 (semver)
unaffected

6.19.14 (semver)
unaffected

7.0.1 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a9940dcbe5cb92482c04efc7341039ddf7dbf607

git.kernel.org/...c/22b7c1c619d808aec4cad3dc42103345e370d107

git.kernel.org/...c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65c

git.kernel.org/...c/27b7c3e916218b5eb2ee350211140e961bfc49be

cve.org (CVE-2026-31609)

nvd.nist.gov (CVE-2026-31609)

Download JSON