CVE-2026-31708 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: May 3, 2026
Linux Kernel - Out-of-Bounds Read
Published: May 1, 2026Updated: May 3, 2026Remote Exploitable
Overview
Linux kernel contains an out-of-bounds read caused by improper bounds checking in smb2_ioctl_query_info QUERY_INFO path, letting a malicious SMB server expose adjacent kernel heap memory to userspace, exploit requires a malicious SMB server.
Severity & Score
Severity: High
CVSS Score: 8.1
Impact
A malicious SMB server can expose adjacent kernel heap memory to userspace, leading to information disclosure.
Mitigation
Update to the latest Linux kernel version containing the fix.
References
- https://git.kernel.org/stable/c/078fae8f50adebb903ccf2252b44391324571e78
- https://git.kernel.org/stable/c/85fd46ee26a11841c670449508025965f61ce131
- https://git.kernel.org/stable/c/a34d456934fe42e4da5d2cc07787bf418bee99c6
- https://git.kernel.org/stable/c/a58c5af19ff0d6f44f6e9fe31e33a2c92223f77e
- https://git.kernel.org/stable/c/ac2f14e4705d020f04e806efa0d49ab8dc2b145f
Related Resources
Details
- CVE ID
- CVE-2026-31708
- Severity
- High
- CVSS Score
- 8.1
- Type
- out_of_bounds_rw
- Status
- unconfirmed
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H