CVE-2026-31539
Description
In the Linux kernel, the following vulnerability has been resolved:
smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available
The logic off managing recv credits by counting posted recv_io and granted credits is racy.
That's because the peer might already consumed a credit, but between receiving the incoming recv at the hardware and processing the completion in the 'recv_done' functions we likely have a window where we grant credits, which don't really exist.
So we better have a decicated counter for the available credits, which will be incremented when we posted new recv buffers and drained when we grant the credits to the peer.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in Linux kernel's smbdirect module allows granting non-existent recv credits, potentially leading to resource exhaustion or denial of service.
Vulnerability
Description
A race condition exists in the Linux kernel's SMB Direct (smbdirect) module in the management of receive (recv) credits. The original logic tracked credits by counting posted recv I/O operations and granted credits separately, but this approach is racy. Between the hardware receiving an incoming message and the completion being processed in the recv_done functions, the peer may have already consumed a credit, yet the kernel might grant additional credits that do not actually exist [1][2][3].
Exploitation
An attacker on the same network as a system using SMB Direct (e.g., over RDMA) could potentially exploit this race condition by carefully timing message delivery to trigger the window where credits are granted incorrectly. No authentication is required beyond network access to the SMB Direct service, as the vulnerability lies in the credit accounting logic that operates before any higher-layer validation.
Impact
Successful exploitation could lead to resource exhaustion or denial of service, as the kernel may grant more credits than available, causing the system to overcommit receive buffers. This could result in memory corruption, system instability, or a complete denial of service for SMB Direct connections.
Mitigation
The fix introduces a dedicated counter for available credits, which is incremented when new recv buffers are posted and decremented when credits are granted to the peer, eliminating the race condition. Patches have been committed to the Linux kernel stable tree [1][2][3]. Users should apply the latest kernel updates to mitigate this vulnerability.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.