CVE-2026-31433
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
22/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix potencial OOB in get_file_all_info() for compound requests<br />
<br />
When a compound request consists of QUERY_DIRECTORY + QUERY_INFO<br />
(FILE_ALL_INFORMATION) and the first command consumes nearly the entire<br />
max_trans_size, get_file_all_info() would blindly call smbConvertToUTF16()<br />
with PATH_MAX, causing out-of-bounds write beyond the response buffer.<br />
In get_file_all_info(), there was a missing validation check for<br />
the client-provided OutputBufferLength before copying the filename into<br />
FileName field of the smb2_file_all_info structure.<br />
If the filename length exceeds the available buffer space, it could lead to<br />
potential buffer overflows or memory corruption during smbConvertToUTF16<br />
conversion. This calculating the actual free buffer size using<br />
smb2_calc_max_out_buf_len() and returning -EINVAL if the buffer is<br />
insufficient and updating smbConvertToUTF16 to use the actual filename<br />
length (clamped by PATH_MAX) to ensure a safe copy operation.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/358cdaa1f7fbf2712cb4c5f6b59cb9a5c673c5fe
- https://git.kernel.org/stable/c/3a852f9d1c981fb14f6bf4e24999e0ea8088a7d7
- https://git.kernel.org/stable/c/4cca3eff2099b18672934a39cee70aed835d652c
- https://git.kernel.org/stable/c/7aec5a769d2356cbf344d85bcfd36de592ac96a5
- https://git.kernel.org/stable/c/9d7032851d6f5adbe2739601ca456c0ad3b422f0
- https://git.kernel.org/stable/c/b0cd9725fe2bcc9f37d096b132318a9060373f5d
- https://git.kernel.org/stable/c/beef2634f81f1c086208191f7228bce1d366493d



