CVE-2026-31536
smb: server: let send_done handle a completion without IB_SEND_SIGNALED
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 24082642654f3e5149913946e89c00a297a8868f 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e38b415c024bc3b6321bf8650dbf3f4aab8e74b3 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9da82dc73cb03e85d716a2609364572367a5ff47
Linux / Linux
All versions affected