CVE-2026-31612
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
27/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: validate EaNameLength in smb2_get_ea()<br />
<br />
smb2_get_ea() reads ea_req->EaNameLength from the client request and<br />
passes it directly to strncmp() as the comparison length without<br />
verifying that the length of the name really is the size of the input<br />
buffer received.<br />
<br />
Fix this up by properly checking the size of the name based on the value<br />
received and the overall size of the request, to prevent a later<br />
strncmp() call to use the length as a "trusted" size of the buffer.<br />
Without this check, uninitialized heap values might be slowly leaked to<br />
the client.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/243b206bcb5a7137e8bddd57b2eec81e1ebd3859
- https://git.kernel.org/stable/c/3363a770b193f555f29d76ddf4ced3305c0ccf6d
- https://git.kernel.org/stable/c/4b73376feecb3b61172fe5b4ff42bbbb8531669d
- https://git.kernel.org/stable/c/551dfb15b182abad4600eaf7b37e6eb7000d5b1b
- https://git.kernel.org/stable/c/66751841212c2cc196577453c37f7774ff363f02
- https://git.kernel.org/stable/c/dfc6878d14acafffbe670bf2576620757a10a3d8



