CVE-2026-31535

In the Linux kernel, the following vulnerability has been resolved: smb: client: make use of smbdirect_socket.recv_io.credits.available The logic off managing recv credits by counting posted recv_io and granted credits is racy. That's because the peer might already consumed a credit, but between receiving the incoming recv at the hardware and processing the completion in the 'recv_done' functions we likely have a window where we grant credits, which don't really exist. So we better have a decicated counter for the available credits, which will be incremented when we posted new recv buffers and drained when we grant the credits to the peer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

28 Apr 2026, 19:14

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/9911b1ed187a770a43950bf51f340ad4b7beecba - () https://git.kernel.org/stable/c/9911b1ed187a770a43950bf51f340ad4b7beecba - Patch
References () https://git.kernel.org/stable/c/be8845ad5d6558703d20567d8702155598325db8 - () https://git.kernel.org/stable/c/be8845ad5d6558703d20567d8702155598325db8 - Patch
References () https://git.kernel.org/stable/c/f664e6e8a81103cb45c8802a9bc7499e0902c458 - () https://git.kernel.org/stable/c/f664e6e8a81103cb45c8802a9bc7499e0902c458 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-367
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
First Time Linux
Linux linux Kernel

24 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 15:16

Updated : 2026-04-28 19:14


NVD link : CVE-2026-31535

Mitre link : CVE-2026-31535

CVE.ORG link : CVE-2026-31535


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition