๐Ÿ” CVE Alert

CVE-2026-43378

UNKNOWN 0.0

smb: server: fix use-after-free in smb2_open()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e1b21e6066615e7d3d3a7aa2677e415e563fd7cc 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b720c84087cb547f23ce03eab93568c1769e4556 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 54b48ae83de8bb06e65079d96368efe359d4909c 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8f5b1a7cb009a93c48e9e334a2f59a660f9afc07 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 190e5f808e8058640b408ccfed25440b441a718a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1e689a56173827669a35da7cb2a3c78ed5c53680
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e1b21e6066615e7d3d3a7aa2677e415e563fd7cc git.kernel.org: https://git.kernel.org/stable/c/b720c84087cb547f23ce03eab93568c1769e4556 git.kernel.org: https://git.kernel.org/stable/c/54b48ae83de8bb06e65079d96368efe359d4909c git.kernel.org: https://git.kernel.org/stable/c/8f5b1a7cb009a93c48e9e334a2f59a660f9afc07 git.kernel.org: https://git.kernel.org/stable/c/190e5f808e8058640b408ccfed25440b441a718a git.kernel.org: https://git.kernel.org/stable/c/1e689a56173827669a35da7cb2a3c78ed5c53680