Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-31432
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-22 Apr, 2026 | 08:15
Updated At-11 May, 2026 | 22:08
Rejected At-
▼CVE Numbering Authority (CNA)
ksmbd: fix OOB write in QUERY_INFO for compound requests

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix OOB write in QUERY_INFO for compound requests When a compound request such as READ + QUERY_INFO(Security) is received, and the first command (READ) consumes most of the response buffer, ksmbd could write beyond the allocated buffer while building a security descriptor. The root cause was that smb2_get_info_sec() checked buffer space using ppntsd_size from xattr, while build_sec_desc() often synthesized a significantly larger descriptor from POSIX ACLs. This patch introduces smb_acl_sec_desc_scratch_len() to accurately compute the final descriptor size beforehand, performs proper buffer checking with smb2_calc_max_out_buf_len(), and uses exact-sized allocation + iov pinning.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/smb2pdu.c
  • fs/smb/server/smbacl.c
  • fs/smb/server/smbacl.h
Default Status
unaffected
Versions
Affected
  • From e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d before d48c64fb80ad78b3dd29fb7d79b6ec7bd72bfc09 (git)
  • From e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d before 075ea208c648cc2bcd616295b711d3637c61de45 (git)
  • From e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d before 515c2daab46021221bdf406bef19bc90a44ec617 (git)
  • From e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d before fda9522ed6afaec45cabc198d8492270c394c7bc (git)
  • f2283680a80571ca82d710bc6ecd8f8beac67d63 (git)
  • 9f297df20d93411c0b4ddad7f88ba04a7cd36e77 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/server/smb2pdu.c
  • fs/smb/server/smbacl.c
  • fs/smb/server/smbacl.h
Default Status
affected
Versions
Affected
  • 6.6
Unaffected
  • From 0 before 6.6 (semver)
  • From 6.12.81 through 6.12.* (semver)
  • From 6.18.22 through 6.18.* (semver)
  • From 6.19.12 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/d48c64fb80ad78b3dd29fb7d79b6ec7bd72bfc09
N/A
https://git.kernel.org/stable/c/075ea208c648cc2bcd616295b711d3637c61de45
N/A
https://git.kernel.org/stable/c/515c2daab46021221bdf406bef19bc90a44ec617
N/A
https://git.kernel.org/stable/c/fda9522ed6afaec45cabc198d8492270c394c7bc
N/A
Hyperlink: https://git.kernel.org/stable/c/d48c64fb80ad78b3dd29fb7d79b6ec7bd72bfc09
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/075ea208c648cc2bcd616295b711d3637c61de45
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/515c2daab46021221bdf406bef19bc90a44ec617
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fda9522ed6afaec45cabc198d8492270c394c7bc
Resource: N/A
Details not found