๐Ÿ” CVE Alert

CVE-2026-31609

UNKNOWN 0.0

smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < a9940dcbe5cb92482c04efc7341039ddf7dbf607 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 22b7c1c619d808aec4cad3dc42103345e370d107 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f9a162c2bbcd0ac85bd07c5b37cf20286048b65c
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a9940dcbe5cb92482c04efc7341039ddf7dbf607 git.kernel.org: https://git.kernel.org/stable/c/22b7c1c619d808aec4cad3dc42103345e370d107 git.kernel.org: https://git.kernel.org/stable/c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65c