Cyber Posture

CVE-2026-31708

High

Published: 01 May 2026

Published
01 May 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
EPSS Score 0.0004 13.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31708 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Linux Linux Kernel. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 13.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the vulnerability by applying kernel patches that add the missing bounds check on the SMB response buffer payload.

prevent

Information input validation requires verifying server-reported OutputBufferLength against the actual response buffer size to prevent out-of-bounds reads during copy_to_user.

prevent

Memory protection mechanisms like kernel heap isolation and randomization mitigate the impact of disclosed adjacent kernel heap data from the out-of-bounds read.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

OOB read in kernel SMB client enables kernel memory disclosure to userspace (C:H impact) when connecting to malicious server, directly facilitating credential access via memory leaks and privilege escalation via info leaks for further kernel exploitation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path smb2_ioctl_query_info() has two response-copy branches: PASSTHRU_FSCTL and the default QUERY_INFO path. The QUERY_INFO branch clamps qi.input_buffer_length to the server-reported OutputBufferLength and…

more

then copies qi.input_buffer_length bytes from qi_rsp->Buffer to userspace, but it never verifies that the flexible-array payload actually fits within rsp_iov[1].iov_len. A malicious server can return OutputBufferLength larger than the actual QUERY_INFO response, causing copy_to_user() to walk past the response buffer and expose adjacent kernel heap to userspace. Guard the QUERY_INFO copy with a bounds check on the actual Buffer payload. Use struct_size(qi_rsp, Buffer, qi.input_buffer_length) rather than an open-coded addition so the guard cannot overflow on 32-bit builds.

Deeper analysisAI

CVE-2026-31708 is an out-of-bounds read vulnerability in the Linux kernel's SMB client, specifically in the smb2_ioctl_query_info() function when handling the QUERY_INFO path. The flaw occurs because the function clamps qi.input_buffer_length to the server-reported OutputBufferLength and copies that length from the response buffer to userspace without verifying that the flexible-array payload fits within rsp_iov[1].iov_len. A malicious server can thus trigger reads beyond the response buffer, exposing adjacent kernel heap memory.

A remote attacker who controls a malicious SMB server can exploit this by returning an OutputBufferLength larger than the actual QUERY_INFO response buffer. Exploitation requires user interaction, such as a victim mounting the share or issuing an SMB2 ioctl query via the Linux kernel's SMB client. This results in kernel heap data leakage to userspace, with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H), enabling high-impact confidentiality violations and potential denial of service through crashes.

Mitigation patches are available in multiple Linux kernel stable branches, as detailed in the referenced git commits (e.g., 078fae8f50adebb903ccf2252b44391324571e78). These fixes add a bounds check on the actual Buffer payload using struct_size(qi_rsp, Buffer, qi.input_buffer_length) to prevent overflow, particularly on 32-bit builds, and ensure the copy_to_user() operation stays within the response buffer. Security practitioners should update affected kernels promptly.

Details

CWE(s)

Affected Products

linux
linux kernel
5.1 — 6.6.136 · 6.7 — 6.12.84 · 6.13 — 6.18.25

CVEs Like This One

CVE-2026-31449Same product: Linux Linux Kernel
CVE-2024-57928Same product: Linux Linux Kernel
CVE-2026-23076Same product: Linux Linux Kernel
CVE-2026-31528Same product: Linux Linux Kernel
CVE-2025-71101Same product: Linux Linux Kernel
CVE-2024-57982Same product: Linux Linux Kernel
CVE-2025-71136Same product: Linux Linux Kernel
CVE-2026-23099Same product: Linux Linux Kernel
CVE-2026-23407Same product: Linux Linux Kernel
CVE-2025-71112Same product: Linux Linux Kernel

References