CVE-2026-31612
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/04/2026
Last modified:
24/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: validate EaNameLength in smb2_get_ea()<br />
<br />
smb2_get_ea() reads ea_req->EaNameLength from the client request and<br />
passes it directly to strncmp() as the comparison length without<br />
verifying that the length of the name really is the size of the input<br />
buffer received.<br />
<br />
Fix this up by properly checking the size of the name based on the value<br />
received and the overall size of the request, to prevent a later<br />
strncmp() call to use the length as a "trusted" size of the buffer.<br />
Without this check, uninitialized heap values might be slowly leaked to<br />
the client.



