Impact
The Linux kernel’s SMB client has a double‑free vulnerability in the smbd_send_batch_flush() routine, which calls smbd_free_send_io() a second time after it has already been freed. This is a classic double‑free flaw (CWE‑415) that can cause heap corruption in the kernel, potentially leading to arbitrary code execution with kernel privileges.
Affected Systems
All Linux kernel releases that contain the SMB client code before the fix are impacted. Specific version ranges are not provided, so any kernel built from source or distributed before the commit that removes the double‑free will be vulnerable. The issue applies to the generic Linux kernel across all distributions.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical vulnerability, while an EPSS score of less than 1% suggests a low current exploitation probability. The flaw is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker could trigger this double‑free (CWE‑415) by sending specially crafted SMB traffic to a vulnerable client, potentially causing memory corruption and kernel privilege escalation.
OpenCVE Enrichment