CVE-2026-31538
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/04/2026
Última modificación:
28/04/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
smb: server: make use of smbdirect_socket.recv_io.credits.available<br />
<br />
The logic off managing recv credits by counting posted recv_io and<br />
granted credits is racy.<br />
<br />
That&#39;s because the peer might already consumed a credit,<br />
but between receiving the incoming recv at the hardware<br />
and processing the completion in the &#39;recv_done&#39; functions<br />
we likely have a window where we grant credits, which<br />
don&#39;t really exist.<br />
<br />
So we better have a decicated counter for the<br />
available credits, which will be incremented<br />
when we posted new recv buffers and drained when<br />
we grant the credits to the peer.<br />
<br />
This fixes regression Namjae reported with<br />
the 6.18 release.
Impacto
Puntuación base 3.x
7.50
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.18 (incluyendo) | 6.18.11 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 6.19.1 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



