-
CVE-2026-43378
- EPSS 0.03%
- Veröffentlicht 08.05.2026 14:21:27
- Zuletzt bearbeitet 12.05.2026 14:10:27
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
smb: server: fix use-after-free in smb2_open()
In the Linux kernel, the following vulnerability has been resolved: smb: server: fix use-after-free in smb2_open() The opinfo pointer obtained via rcu_dereference(fp->f_opinfo) is dereferenced after rcu_read_unlock(), creating a use-after-free window.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
e1b21e6066615e7d3d3a7aa2677e415e563fd7cc
Status
affected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
b720c84087cb547f23ce03eab93568c1769e4556
Status
affected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
54b48ae83de8bb06e65079d96368efe359d4909c
Status
affected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
8f5b1a7cb009a93c48e9e334a2f59a660f9afc07
Status
affected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
190e5f808e8058640b408ccfed25440b441a718a
Status
affected
Version
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9
Version <
1e689a56173827669a35da7cb2a3c78ed5c53680
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.15
Status
affected
Version
0
Version <
5.15
Status
unaffected
Version <=
6.1.*
Version
6.1.167
Status
unaffected
Version <=
6.6.*
Version
6.6.130
Status
unaffected
Version <=
6.12.*
Version
6.12.78
Status
unaffected
Version <=
6.18.*
Version
6.18.19
Status
unaffected
Version <=
6.19.*
Version
6.19.9
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.094 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|