CVE-2026-31712 - Vulnerability Analysis
HighCVSS: 8.3Last Updated: May 3, 2026
Linux Kernel - Out-of-Bounds Read
Published: May 1, 2026Updated: May 3, 2026Remote Exploitable
Overview
Linux kernel contains an out-of-bounds read vulnerability in ksmbd smb_check_perm_dacl() due to insufficient ACE size validation, letting authenticated SMB clients with ACL set permission cause kernel memory corruption, exploit requires ACL set permission on a file.
Severity & Score
Severity: High
CVSS Score: 8.3
Impact
Authenticated SMB clients can cause kernel memory corruption and potential denial of service via crafted ACLs.
Mitigation
Update to the latest Linux kernel version containing the fix for ACE size validation in smb_check_perm_dacl().
References
Related Resources
Details
- CVE ID
- CVE-2026-31712
- Severity
- High
- CVSS Score
- 8.3
- Type
- out_of_bounds_rw
- Status
- unconfirmed
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H