PT-2026-34349 · Linux · Linux Kernel
Published
2026-04-22
·
Updated
2026-04-22
·
CVE-2026-31444
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions
Linux kernel (affected versions not specified)
Description
The
smb grant oplock() function in ksmbd contains two issues. First, a use-after-free occurs when opinfo is linked into ci->m op list before add lease global list() is called; if the latter fails, the error path frees opinfo while it remains linked, leading concurrent readers to dereference the freed node. Second, a NULL dereference occurs because opinfo->o fp is assigned after add lease global list() publishes opinfo on the global lease list, allowing find same lease key() to dereference opinfo->o fp->f ci while o fp is still NULL.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux Kernel