Home

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: use check_add_overflow() to prevent u16 DACL size overflow set_posix_acl_entries_dacl() and set_ntacl_dacl() accumulate ACE sizes in u16 variables. When a file has many POSIX ACL entries, the accumulated size can wrap past 65535, causing the pointer arithmetic (char *)pndace + *size to land within already-written ACEs. Subsequent writes then overwrite earlier entries, and pndacl->size gets a truncated value. Use check_add_overflow() at each accumulation point to detect the wrap before it corrupts the buffer, consistent with existing check_mul_overflow() usage elsewhere in smbacl.c.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 8d5729350b236896f51379588d9a690b7fafb8db
affected

e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before e1955a94b6f17f4b058afa955a6f187eb3ed7615
affected

e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 5e7b8f3c539d69b2ed5f2408e2f75e68ce7eef43
affected

e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before ef7902be3f215b6bf7babe4dc9dd9a7d57dad7a7
affected

e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 (git) before 299f962c0b02d048fb45d248b4da493d03f3175d
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

6.6.136 (semver)
unaffected

6.12.84 (semver)
unaffected

6.18.25 (semver)
unaffected

7.0.2 (semver)
unaffected

7.1-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8d5729350b236896f51379588d9a690b7fafb8db

git.kernel.org/...c/e1955a94b6f17f4b058afa955a6f187eb3ed7615

git.kernel.org/...c/5e7b8f3c539d69b2ed5f2408e2f75e68ce7eef43

git.kernel.org/...c/ef7902be3f215b6bf7babe4dc9dd9a7d57dad7a7

git.kernel.org/...c/299f962c0b02d048fb45d248b4da493d03f3175d

cve.org (CVE-2026-31704)

nvd.nist.gov (CVE-2026-31704)

Download JSON