๐Ÿ” CVE Alert

CVE-2026-31534

UNKNOWN 0.0

smb: client: let send_done handle a completion without IB_SEND_SIGNALED

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: client: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 16c8be3d55441287ddd334e25df4cc376450dec9 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 86d9742c3f7ed7eba677517c80b4597822750e65 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < cf74fcdc43b322b6188a0750b5ee79e38be6d078
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/16c8be3d55441287ddd334e25df4cc376450dec9 git.kernel.org: https://git.kernel.org/stable/c/86d9742c3f7ed7eba677517c80b4597822750e65 git.kernel.org: https://git.kernel.org/stable/c/cf74fcdc43b322b6188a0750b5ee79e38be6d078