Impact
A double‑free bug in the Linux kernel SMB server is triggered by calling smb_direct_free_sendmsg() twice, once by smb_direct_flush_send_list() and again after a message is sent. This flaw, identified as CWE‑1341 and CWE‑415, can corrupt kernel memory structures, although the advisory text does not mention any observed crashes or exploitation. The vulnerability has been resolved by moving the duplicate call to the batch list so that both paths are no longer executed.
Affected Systems
The issue affects Linux kernel releases that do not yet contain the referenced commits, as indicated by the Git commit links in the advisory. Administrators should verify that the running kernel includes the fix applied in the commits listed, otherwise the system remains vulnerable.
Risk and Exploitability
The CVSS score of 9.8 underscores the criticality, while the EPSS value of <1% suggests a low likelihood of current exploitation. The double‑free occurs within the SMB protocol stack, so a likely attack vector would be an attacker sending malicious SMB packets to trigger the flaw. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment