CVE-2026-31537
smb: server: make use of smbdirect_socket.send_io.bcredits
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a single 'batch' credit per connection. And code getting that credit is free to use as much messages until remaining_length reaches 0, then the batch credit it given back and the next logical send can happen.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 79242e7b6bc63efec28b7c235bc320806afce6c0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 34abd408c8ba24d7c97bd02ba874d8c714f49db1
Linux / Linux
All versions affected