CVE-2026-31609

critical

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.

References

https://git.kernel.org/stable/c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65c

https://git.kernel.org/stable/c/a9940dcbe5cb92482c04efc7341039ddf7dbf607

https://git.kernel.org/stable/c/27b7c3e916218b5eb2ee350211140e961bfc49be

https://git.kernel.org/stable/c/22b7c1c619d808aec4cad3dc42103345e370d107

Details

Source: Mitre, NVD

Published: 2026-04-24

Updated: 2026-04-29

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00017