CVE-2026-31610
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_negTokenInit() reaches the mechToken [2] OCTET STRING element, ksmbd_neg_token_alloc() allocates conn->mechToken immediately via kmemdup_nul(). If a later element in the same blob is malformed, then the decoder will return nonzero after the allocation is already live. This could happen if mechListMIC [3] overrunse the enclosing SEQUENCE.
decode_negotiation_token() then sets conn->use_spnego = false because both the negTokenInit and negTokenTarg grammars failed. The cleanup at the bottom of smb2_sess_setup() is gated on use_spnego:
if (conn->use_spnego && conn->mechToken) { kfree(conn->mechToken); conn->mechToken = NULL; }
so the kfree is skipped, causing the mechToken to never be freed.
This codepath is reachable pre-authentication, so untrusted clients can cause slow memory leaks on a server without even being properly authenticated.
Fix this up by not checking check for use_spnego, as it's not required, so the memory will always be properly freed. At the same time, always free the memory in ksmbd_conn_free() incase some other failure path forgot to free it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ksmbd, a memory leak of mechToken occurs when SPNEGO decoding fails after token allocation, exploitable pre-authentication by untrusted clients.
Vulnerability
In the Linux kernel's ksmbd (SMB server), a memory leak vulnerability exists in the SPNEGO negotiation handling. The kernel ASN.1 BER decoder calls action callbacks incrementally as it processes the input. When ksmbd_decode_negTokenInit() reaches the mechToken [2] OCTET STRING element, ksmbd_neg_token_alloc() allocates conn->mechToken via kmemdup_nul(). If a later element in the same blob is malformed (e.g., mechListMIC [3] overruns the enclosing SEQUENCE), the decoder returns nonzero after the allocation is already live. The cleanup code in decode_negotiation_token() sets conn->use_spnego = false because both grammars failed, and the subsequent free in smb2_sess_setup() is gated on conn->use_spnego, causing the allocated mechToken to never be freed [1][2][3][4].
Exploitation
This codepath is reachable pre-authentication, meaning an untrusted client can trigger the leak without any prior authentication. By sending a crafted SPNEGO blob that passes the initial token allocation but fails later in the decoding, an attacker can cause repeated memory allocations that are never freed. No special network position is required beyond the ability to connect to the SMB server.
Impact
The vulnerability results in a slow memory leak on the server. Over time, repeated exploitation can exhaust system memory, leading to denial of service (DoS) for legitimate users. The leak is per-session, so an attacker can amplify the effect by opening many connections.
Mitigation
The fix, applied to multiple stable kernel branches [1][2][3][4], removes the use_spnego check from the cleanup path, ensuring mechToken is always freed when the session setup fails. Additionally, the memory is now freed in ksmbd_conn_free() as a safety net for any other failure paths. Users should update their kernels to include the patched commits.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/stable/c/269c800a7a7e363459291885b35f7bc72e231ed6nvdPatch
- git.kernel.org/stable/c/6c8c44e6553b9f072f62d9875e567766eb293162nvdPatch
- git.kernel.org/stable/c/745a535461bbb90a56d9357573c9f97a5c12abe1nvdPatch
- git.kernel.org/stable/c/ad0057fb91218914d6c98268718ceb9d59b388e1nvdPatch
- git.kernel.org/stable/c/dd53414e301beb915fe672dc4c4a51bafb917604nvdPatch
- git.kernel.org/stable/c/dd577cb55588ec3fbc66af3621280306601c4192nvdPatch
News mentions
0No linked articles in our index yet.