CVE-2026-31705 PUBLISHED

ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment

smb2_get_ea() applies 4-byte alignment padding via memset() after writing each EA entry. The bounds check on buf_free_len is performed before the value memcpy, but the alignment memset fires unconditionally afterward with no check on remaining space.

When the EA value exactly fills the remaining buffer (buf_free_len == 0 after value subtraction), the alignment memset writes 1-3 NUL bytes past the buf_free_len boundary. In compound requests where the response buffer is shared across commands, the first command (e.g., READ) can consume most of the buffer, leaving a tight remainder for the QUERY_INFO EA response. The alignment memset then overwrites past the physical kvmalloc allocation into adjacent kernel heap memory.

Add a bounds check before the alignment memset to ensure buf_free_len can accommodate the padding bytes.

This is the same bug pattern fixed by commit beef2634f81f ("ksmbd: fix potencial OOB in get_file_all_info() for compound requests") and commit fda9522ed6af ("ksmbd: fix OOB write in QUERY_INFO for compound requests"), both of which added bounds checks before unconditional writes in QUERY_INFO response handlers.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d to ffbce350c6fd1e99116ea57383b9031717e36d3b (excl.)
  • affected from e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d to 98f3de6ef4efbd899348d333f0902dc4ff14380c (excl.)
  • affected from e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d to 790304c02bf9bd7b8171feda4294d6e62d32ae8f (excl.)
  • affected from e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d to 922d48fe8c19f388ffa2f709f33acaae4e408de2 (excl.)
  • affected from e2b76ab8b5c9327ab2dae6da05d0752eb2f4771d to 30010c952077a1c89ecdd71fc4d574c75a8f5617 (excl.)
  • Version f2283680a80571ca82d710bc6ecd8f8beac67d63 is affected
  • Version 9f297df20d93411c0b4ddad7f88ba04a7cd36e77 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.6 is affected
  • unaffected from 0 to 6.6 (excl.)
  • unaffected from 6.6.136 to 6.6.* (incl.)
  • unaffected from 6.12.84 to 6.12.* (incl.)
  • unaffected from 6.18.25 to 6.18.* (incl.)
  • unaffected from 7.0.2 to 7.0.* (incl.)
  • unaffected from 7.1-rc1 to * (incl.)

References