Impact
An improper handling of the SMBDIRECT socket credit counter in the Linux kernel can corrupt the stream of data transfer messages when an empty immediate send is performed. The bug manifests as a loss of data integrity in SMB traffic, potentially causing downtime or erratic behavior for clients communicating with the affected SMB server. The underlying weakness is a failure to correctly validate or manage buffer credits, which aligns with the CWE-821 classification of inadequate bounds checking.
Affected Systems
All Linux kernel builds that have not yet applied the fix for CVE-2026-31537 are susceptible. The exact kernel versions impacted are not listed in the CVE data; the remedy is referenced in the commit logs linked in the advisory. System administrators should review their kernel version and upgrade to a patched release where the smbdirect_socket.send_io.bcredits logic has been corrected.
Risk and Exploitability
The EPSS score for this vulnerability is reported as < 1%, indicating a very low probability of exploitation in real‑world scenarios, and it is not listed in the CISA KEV catalog. The CVSS score is 5.5, indicating moderate severity. The defect resides at the SMB protocol handling layer of the kernel, so an attacker would need network access to an exposed SMB service to trigger the corrupting send. Although the impact could be a denial of service or data corruption, the combination of the low EPSS, lack of a known exploit, and the requirement for a crafted SMB packet suggests a moderate but not immediate threat. Patching remains the recommended countermeasure.
OpenCVE Enrichment