Updated: 2026-02-04 04:17:07.449225
Description:
In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and remaining_data_length This is inspired by the related server fixes.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | In Testing | 2026-01-29 04:13:12 | ||
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Ignored | 2026-02-05 04:22:36 | This flaw is confined to the SMB client receive path and yields only a denial‑of‑service (kernel... | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | In Testing | 2026-02-07 05:05:07 | ||
| CentOS Stream 8 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2026:1770032032 | 2026-02-02 15:01:45 | |
| Oracle Linux 7 ELS | kernel-uek | 5.4.17 | 5.5 | MEDIUM | Ignored | 2026-02-05 04:18:24 | This flaw sits in the kernel SMB client receive path and is only reachable when the host actively co... | |
| TuxCare 9.6 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Needs Triage | 2026-01-19 16:16:15 | ||
| Ubuntu 20.04 ELS | linux | 5.4.0 | 5.5 | MEDIUM | Ignored | 2026-02-05 04:13:53 | This flaw is reachable only through the kernel SMB/CIFS client path during an active SMB mount to a ... |