Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_free_send_io(), so we should not call it again after smbd_post_send() moved it to the batch list.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.18.24 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/22b7c1c619d808aec4cad3dc42103345e370d107Patch
- https://git.kernel.org/stable/c/27b7c3e916218b5eb2ee350211140e961bfc49bePatch
- https://git.kernel.org/stable/c/a9940dcbe5cb92482c04efc7341039ddf7dbf607Patch
- https://git.kernel.org/stable/c/f9a162c2bbcd0ac85bd07c5b37cf20286048b65cPatch
FAQ
What is CVE-2026-31609?
CVE-2026-31609 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In the Linux kernel, the following vulnerability has been resolved: smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush() smbd_send_batch_flush() already calls smbd_fre...
How severe is CVE-2026-31609?
CVE-2026-31609 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-31609?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.