Bug 2461571 (CVE-2026-31612) - CVE-2026-31612 kernel: ksmbd: validate EaNameLength in smb2_get_ea()
Summary: CVE-2026-31612 kernel: ksmbd: validate EaNameLength in smb2_get_ea()
Keywords:
Status: NEW
Alias: CVE-2026-31612
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-04-24 15:09 UTC by OSIDB Bzimport
Modified: 2026-04-24 19:52 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-04-24 15:09:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate EaNameLength in smb2_get_ea()

smb2_get_ea() reads ea_req->EaNameLength from the client request and
passes it directly to strncmp() as the comparison length without
verifying that the length of the name really is the size of the input
buffer received.

Fix this up by properly checking the size of the name based on the value
received and the overall size of the request, to prevent a later
strncmp() call to use the length as a "trusted" size of the buffer.
Without this check, uninitialized heap values might be slowly leaked to
the client.


Note You need to log in before you can comment on or make changes to this bug.