The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31708

CVE-2026-31708: Linux Kernel Information Disclosure Flaw

CVE-2026-31708 is an information disclosure vulnerability in the Linux Kernel SMB client that allows malicious servers to expose kernel heap memory to userspace. This article covers technical details, impact, and mitigation.

Published: May 7, 2026

CVE-2026-31708 Overview

CVE-2026-31708 is an out-of-bounds read vulnerability [CWE-125] in the Linux kernel's SMB client code. The flaw resides in smb2_ioctl_query_info(), specifically in the default QUERY_INFO response-copy branch. The function clamps qi.input_buffer_length to the server-reported OutputBufferLength and copies that many bytes from qi_rsp->Buffer to userspace. It never verifies that the flexible-array payload fits within rsp_iov[1].iov_len. A malicious SMB server can return an OutputBufferLength value larger than the actual QUERY_INFO response, causing copy_to_user() to walk past the response buffer and expose adjacent kernel heap memory to userspace.

Critical Impact

A malicious or compromised SMB server can leak adjacent kernel heap memory to a connected Linux client, enabling kernel information disclosure that may aid further exploitation.

Affected Products

  • Linux Kernel (multiple stable branches; see kernel.org patch references)
  • Distributions shipping the in-tree cifs/smb client module
  • Systems mounting remote SMB shares from untrusted servers

Discovery Timeline

  • 2026-05-01 - CVE-2026-31708 published to NVD
  • 2026-05-06 - Last updated in NVD database

Technical Details for CVE-2026-31708

Vulnerability Analysis

The defect lives in the SMB2 IOCTL handler smb2_ioctl_query_info() in the Linux kernel CIFS/SMB client. The function dispatches into two response-copy branches: PASSTHRU_FSCTL and the default QUERY_INFO path. The QUERY_INFO branch trusts the server-supplied OutputBufferLength after clamping it against qi.input_buffer_length, then performs a copy_to_user() from the server response buffer.

The missing validation is a comparison between the bytes about to be copied and the size of the receive iovec, rsp_iov[1].iov_len. Because the flexible-array payload qi_rsp->Buffer lives at the tail of the response, an attacker-controlled length larger than the genuine payload causes the copy to read past the legitimate response into adjacent kernel heap memory. Those bytes are then handed to userspace.

Root Cause

The root cause is missing bounds enforcement on the flexible-array payload size. The code uses qi.input_buffer_length directly as a copy length without confirming that struct_size(qi_rsp, Buffer, qi.input_buffer_length) is less than or equal to rsp_iov[1].iov_len. The fix introduces this guard using struct_size() rather than open-coded arithmetic, eliminating integer overflow risk on 32-bit builds.

Attack Vector

Exploitation requires a Linux client to issue an IOCTL with CIFS_QUERY_INFO against a malicious or compromised SMB server. The server returns a forged QUERY_INFO response whose OutputBufferLength field exceeds the true payload length. The kernel then copies adjacent heap contents to the userspace caller. The CVSS vector indicates network-based access with user interaction required, reflecting the need for a client-initiated mount or IOCTL against the attacker-controlled server. See the upstream patches at Kernel Patch a34d4569 and Kernel Patch 078fae8f for the corrected logic.

Detection Methods for CVE-2026-31708

Indicators of Compromise

  • Unexpected SMB mounts from clients to untrusted or external IP addresses on TCP/445
  • CIFS_IOC_QUERY_INFO IOCTL invocations against newly observed SMB servers
  • SMB2 QUERY_INFO responses where the server-declared OutputBufferLength exceeds the on-wire payload size
  • Kernel log entries from the cifs module indicating malformed responses

Detection Strategies

  • Inspect SMB2 traffic for QUERY_INFO responses whose OutputBufferLength exceeds the remaining message length
  • Audit running kernel versions across the fleet against the fixed commits referenced on git.kernel.org
  • Alert on Linux endpoints initiating outbound SMB sessions to non-corporate destinations

Monitoring Recommendations

  • Forward auditd and kernel ring buffer events for the cifs module to a central log platform
  • Track package versions of linux-image across distributions to confirm patched kernels are deployed
  • Baseline expected SMB server destinations and alert on deviations

How to Mitigate CVE-2026-31708

Immediate Actions Required

  • Apply the upstream kernel patches referenced on git.kernel.org and reboot affected hosts
  • Update to a distribution kernel that includes the fix for smb2_ioctl_query_info()
  • Restrict outbound SMB (TCP/445) traffic from Linux clients to known, trusted file servers
  • Avoid mounting SMB shares from untrusted or internet-exposed servers until patches are applied

Patch Information

The fix adds a bounds check using struct_size(qi_rsp, Buffer, qi.input_buffer_length) against rsp_iov[1].iov_len before copy_to_user(). Upstream commits are available at Kernel Patch 078fae8f, Kernel Patch 85fd46ee, Kernel Patch a34d4569, Kernel Patch a58c5af1, and Kernel Patch ac2f14e4.

Workarounds

  • Unload the cifs kernel module on systems that do not require SMB client functionality
  • Block outbound TCP/445 and TCP/139 at the host or perimeter firewall where SMB is not required
  • Limit which users can issue CIFS_IOC_QUERY_INFO by tightening mount permissions and noexec/nosuid mount options
bash
# Temporarily disable the cifs client module on hosts that do not use SMB
sudo modprobe -r cifs
echo "blacklist cifs" | sudo tee /etc/modprobe.d/disable-cifs.conf

# Block outbound SMB at the host firewall (nftables example)
sudo nft add rule inet filter output tcp dport {139, 445} drop

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Vendor Resources
  • Kernel Patch 078fae8f

  • Kernel Patch 85fd46ee

  • Kernel Patch a34d4569

  • Kernel Patch a58c5af1

  • Kernel Patch ac2f14e4
  • Related CVEs
  • CVE-2026-43088: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43085: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43089: Linux Kernel Information Disclosure Flaw

  • CVE-2026-43224: Linux Kernel Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English