← Volver a CVEs
CVE-2026-31537
N/ADescripcion
In the Linux kernel, the following vulnerability has been resolved: smb: server: make use of smbdirect_socket.send_io.bcredits It turns out that our code will corrupt the stream of reassabled data transfer messages when we trigger an immendiate (empty) send. In order to fix this we'll have a single 'batch' credit per connection. And code getting that credit is free to use as much messages until remaining_length reaches 0, then the batch credit it given back and the next logical send can happen.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado4/24/2026
Ultima modificacion4/24/2026
Fuentenvd
Avistamientos honeypot0
Referencias
https://git.kernel.org/stable/c/34abd408c8ba24d7c97bd02ba874d8c714f49db1(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/5ef18a2e66f2f33fdac64437bddfb9fe6389fdc7(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
https://git.kernel.org/stable/c/79242e7b6bc63efec28b7c235bc320806afce6c0(416baaa9-dc9f-4396-8d5f-8c081fb06d67)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.