CVE-2026-31608

In the Linux kernel, the following vulnerability has been resolved: smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list() smb_direct_flush_send_list() already calls smb_direct_free_sendmsg(), so we should not call it again after post_sendmsg() moved it to the batch list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Apr 2026, 20:03

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-415
References () https://git.kernel.org/stable/c/2ba03f46132b0d1a7bafb86e1ef61951a2254023 - () https://git.kernel.org/stable/c/2ba03f46132b0d1a7bafb86e1ef61951a2254023 - Patch
References () https://git.kernel.org/stable/c/6968c91fab05b8fc4d6700e0cf34472bb422df25 - () https://git.kernel.org/stable/c/6968c91fab05b8fc4d6700e0cf34472bb422df25 - Patch
References () https://git.kernel.org/stable/c/830de6eeb9db4cb7e758201fb99328ef4ca4b032 - () https://git.kernel.org/stable/c/830de6eeb9db4cb7e758201fb99328ef4ca4b032 - Patch
References () https://git.kernel.org/stable/c/84ff995ae826aa6bbcc6c7b9ea569ff67c021d72 - () https://git.kernel.org/stable/c/84ff995ae826aa6bbcc6c7b9ea569ff67c021d72 - Patch

27 Apr 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

27 Apr 2026, 12:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/84ff995ae826aa6bbcc6c7b9ea569ff67c021d72 -

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-29 20:03


NVD link : CVE-2026-31608

Mitre link : CVE-2026-31608

CVE.ORG link : CVE-2026-31608


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free