Home

Description

In the Linux kernel, the following vulnerability has been resolved: smb: server: let send_done handle a completion without IB_SEND_SIGNALED With smbdirect_send_batch processing we likely have requests without IB_SEND_SIGNALED, which will be destroyed in the final request that has IB_SEND_SIGNALED set. If the connection is broken all requests are signaled even without explicit IB_SEND_SIGNALED.

PUBLISHED Reserved 2026-03-09 | Published 2026-04-24 | Updated 2026-04-27 | Assigner Linux




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

0626e6641f6b467447c81dd7678a69c66f7746cf (git) before 24082642654f3e5149913946e89c00a297a8868f
affected

0626e6641f6b467447c81dd7678a69c66f7746cf (git) before e38b415c024bc3b6321bf8650dbf3f4aab8e74b3
affected

0626e6641f6b467447c81dd7678a69c66f7746cf (git) before 9da82dc73cb03e85d716a2609364572367a5ff47
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

6.18.11 (semver)
unaffected

6.19.1 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/24082642654f3e5149913946e89c00a297a8868f

git.kernel.org/...c/e38b415c024bc3b6321bf8650dbf3f4aab8e74b3

git.kernel.org/...c/9da82dc73cb03e85d716a2609364572367a5ff47

cve.org (CVE-2026-31536)

nvd.nist.gov (CVE-2026-31536)

Download JSON