CVE-2026-43378
smb: server: fix use-after-free in smb2_open()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e1b21e6066615e7d3d3a7aa2677e415e563fd7cc 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b720c84087cb547f23ce03eab93568c1769e4556 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 54b48ae83de8bb06e65079d96368efe359d4909c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8f5b1a7cb009a93c48e9e334a2f59a660f9afc07 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 190e5f808e8058640b408ccfed25440b441a718a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1e689a56173827669a35da7cb2a3c78ed5c53680
Linux / Linux
All versions affected References
git.kernel.org: https://git.kernel.org/stable/c/e1b21e6066615e7d3d3a7aa2677e415e563fd7cc git.kernel.org: https://git.kernel.org/stable/c/b720c84087cb547f23ce03eab93568c1769e4556 git.kernel.org: https://git.kernel.org/stable/c/54b48ae83de8bb06e65079d96368efe359d4909c git.kernel.org: https://git.kernel.org/stable/c/8f5b1a7cb009a93c48e9e334a2f59a660f9afc07 git.kernel.org: https://git.kernel.org/stable/c/190e5f808e8058640b408ccfed25440b441a718a git.kernel.org: https://git.kernel.org/stable/c/1e689a56173827669a35da7cb2a3c78ed5c53680