Bug 2461575 (CVE-2026-31539) - CVE-2026-31539 kernel: smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available
Summary: CVE-2026-31539 kernel: smb: smbdirect: introduce smbdirect_socket.recv_io.cre...
Keywords:
Status: NEW
Alias: CVE-2026-31539
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 15:09 UTC by OSIDB Bzimport
Modified: 2026-04-27 12:20 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 15:09:18 UTC
In the Linux kernel, the following vulnerability has been resolved:

smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available

The logic off managing recv credits by counting posted recv_io and
granted credits is racy.

That's because the peer might already consumed a credit,
but between receiving the incoming recv at the hardware
and processing the completion in the 'recv_done' functions
we likely have a window where we grant credits, which
don't really exist.

So we better have a decicated counter for the
available credits, which will be incremented
when we posted new recv buffers and drained when
we grant the credits to the peer.


Note You need to log in before you can comment on or make changes to this bug.