The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31612

CVE-2026-31612: Linux Kernel Information Disclosure Flaw

CVE-2026-31612 is an information disclosure vulnerability in the Linux Kernel's ksmbd module that could leak uninitialized heap values. This article covers the technical details, affected versions, and mitigation.

Published: April 30, 2026

CVE-2026-31612 Overview

A memory information disclosure vulnerability exists in the Linux kernel's ksmbd (SMB3 server) component. The smb2_get_ea() function reads ea_req->EaNameLength from client requests and passes it directly to strncmp() as the comparison length without proper validation. This allows remote attackers to potentially leak uninitialized heap memory values by sending crafted SMB requests with manipulated EaNameLength values.

Critical Impact

Remote unauthenticated attackers can exploit this vulnerability over the network to leak sensitive heap memory contents from affected Linux kernel systems running ksmbd, potentially exposing sensitive data or memory layout information useful for further attacks.

Affected Products

  • Linux Kernel (multiple versions with ksmbd support)
  • Systems running ksmbd SMB3 file server implementation
  • Linux-based file servers with SMB3 sharing enabled

Discovery Timeline

  • 2026-04-24 - CVE-2026-31612 published to NVD
  • 2026-04-29 - Last updated in NVD database

Technical Details for CVE-2026-31612

Vulnerability Analysis

This vulnerability resides in the kernel's in-kernel SMB3 file server (ksmbd) implementation, specifically within the smb2_get_ea() function responsible for handling Extended Attributes (EA) requests from SMB clients. The function reads the EaNameLength field from incoming client requests and uses this value directly in subsequent strncmp() calls without validating that the provided length matches the actual size of the input buffer.

When a client sends a malicious request with an EaNameLength value that exceeds the actual buffer size, the strncmp() function reads beyond the legitimate buffer boundaries into uninitialized heap memory. The comparison results can then be inferred from server responses, allowing attackers to gradually extract heap memory contents byte-by-byte through a series of crafted requests.

Root Cause

The root cause is improper input validation in the smb2_get_ea() function. The code trusts the client-supplied EaNameLength value without verifying it against the actual size of the received request buffer. This missing bounds check violates the security principle of never trusting client-provided data, particularly length fields that control memory access operations.

The fix introduces proper validation by checking the size of the name based on the received value against the overall size of the request, ensuring the EaNameLength cannot exceed the legitimate buffer boundaries before being used in memory comparison operations.

Attack Vector

The attack is network-based and requires no authentication or user interaction. An attacker can exploit this vulnerability by:

  1. Establishing an SMB connection to a vulnerable ksmbd server
  2. Crafting SMB2 GET_EA requests with manipulated EaNameLength values exceeding the actual buffer size
  3. Analyzing server responses to infer byte values from uninitialized heap memory
  4. Repeating the process to systematically leak heap contents

The vulnerability allows for information disclosure of heap memory, which could reveal sensitive data such as memory addresses (defeating ASLR), cryptographic keys, credentials, or other confidential information residing in kernel heap memory.

Detection Methods for CVE-2026-31612

Indicators of Compromise

  • Unusual SMB2 traffic patterns with malformed GET_EA requests
  • SMB connections exhibiting repeated requests with varying EaNameLength parameters
  • Anomalous ksmbd log entries indicating parsing errors or unexpected request sizes
  • Network traffic analysis showing SMB2 requests with length field inconsistencies

Detection Strategies

  • Monitor SMB traffic for requests with EaNameLength values that don't match actual payload sizes
  • Deploy network intrusion detection rules targeting malformed SMB2 EA requests
  • Enable kernel auditing for ksmbd operations and monitor for suspicious patterns
  • Implement deep packet inspection for SMB3 protocol anomalies

Monitoring Recommendations

  • Enable detailed ksmbd logging and forward logs to SIEM for analysis
  • Configure network monitoring to alert on high volumes of SMB2 GET_EA requests from single sources
  • Monitor kernel messages for memory-related warnings in ksmbd contexts
  • Implement baseline analysis for normal SMB traffic patterns to detect anomalous behavior

How to Mitigate CVE-2026-31612

Immediate Actions Required

  • Apply the latest kernel security patches addressing this vulnerability immediately
  • If patching is not immediately possible, consider disabling ksmbd if SMB3 file sharing is not required
  • Restrict network access to SMB services using firewall rules to trusted networks only
  • Monitor for exploitation attempts while patches are being deployed
  • Review and audit systems that have had ksmbd exposed to untrusted networks

Patch Information

Multiple patches have been released for different kernel branches to address this vulnerability. The fix properly validates the EaNameLength field against the actual request buffer size before using it in strncmp() operations.

Available kernel patches:

  • Kernel Patch 243b206
  • Kernel Patch 3363a77
  • Kernel Patch 4b73376
  • Kernel Patch 551dfb1
  • Kernel Patch 6675184
  • Kernel Patch dfc6878d

Workarounds

  • Disable ksmbd kernel module if SMB3 file sharing functionality is not required: modprobe -r ksmbd
  • Implement network-level access controls to restrict SMB access to trusted IP ranges only
  • Use alternative SMB implementations like Samba userspace daemon until patches can be applied
  • Deploy network segmentation to isolate file servers from untrusted network segments
  • Configure firewall rules to block SMB traffic (ports 445, 139) from untrusted sources
bash
# Disable ksmbd module and prevent automatic loading
modprobe -r ksmbd
echo "blacklist ksmbd" >> /etc/modprobe.d/blacklist-ksmbd.conf

# Restrict SMB access using iptables (example for trusted subnet)
iptables -A INPUT -p tcp --dport 445 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 445 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Kernel Patch 243b206

  • Kernel Patch 3363a77

  • Kernel Patch 4b73376

  • Kernel Patch 551dfb1

  • Kernel Patch 6675184

  • Kernel Patch dfc6878d
  • Related CVEs
  • CVE-2026-31708: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43088: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43085: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43089: Linux Kernel Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English