-

CVE-2026-43378

smb: server: fix use-after-free in smb2_open()

In the Linux kernel, the following vulnerability has been resolved:

smb: server: fix use-after-free in smb2_open()

The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is
dereferenced after rcu_read_unlock(), creating a use-after-free
window.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < e1b21e6066615e7d3d3a7aa2677e415e563fd7cc
Status affected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < b720c84087cb547f23ce03eab93568c1769e4556
Status affected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < 54b48ae83de8bb06e65079d96368efe359d4909c
Status affected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < 8f5b1a7cb009a93c48e9e334a2f59a660f9afc07
Status affected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < 190e5f808e8058640b408ccfed25440b441a718a
Status affected
Version e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version < 1e689a56173827669a35da7cb2a3c78ed5c53680
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.15
Status affected
Version 0
Version < 5.15
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.