๐Ÿ” CVE Alert

CVE-2026-31608

UNKNOWN 0.0

smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6968c91fab05b8fc4d6700e0cf34472bb422df25 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2ba03f46132b0d1a7bafb86e1ef61951a2254023 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 830de6eeb9db4cb7e758201fb99328ef4ca4b032
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6968c91fab05b8fc4d6700e0cf34472bb422df25 git.kernel.org: https://git.kernel.org/stable/c/2ba03f46132b0d1a7bafb86e1ef61951a2254023 git.kernel.org: https://git.kernel.org/stable/c/830de6eeb9db4cb7e758201fb99328ef4ca4b032