๐Ÿ” CVE Alert

CVE-2026-31537

UNKNOWN 0.0

smb: server: make use of smbdirect_socket.send_io.bcredits

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a single 'batch' credit per connection. And code getting that credit is free to use as much messages until remaining_length reaches 0, then the batch credit it given back and the next logical send can happen.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 79242e7b6bc63efec28b7c235bc320806afce6c0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 34abd408c8ba24d7c97bd02ba874d8c714f49db1
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7 git.kernel.org: https://git.kernel.org/stable/c/79242e7b6bc63efec28b7c235bc320806afce6c0 git.kernel.org: https://git.kernel.org/stable/c/34abd408c8ba24d7c97bd02ba874d8c714f49db1