๐Ÿ” CVE Alert

CVE-2026-31536

UNKNOWN 0.0

smb: server: let send_done handle a completion without IB_SEND_SIGNALED

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 24082642654f3e5149913946e89c00a297a8868f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e38b415c024bc3b6321bf8650dbf3f4aab8e74b3 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9da82dc73cb03e85d716a2609364572367a5ff47
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/24082642654f3e5149913946e89c00a297a8868f git.kernel.org: https://git.kernel.org/stable/c/e38b415c024bc3b6321bf8650dbf3f4aab8e74b3 git.kernel.org: https://git.kernel.org/stable/c/9da82dc73cb03e85d716a2609364572367a5ff47