In the Linux kernel, the following vulnerability has been...
Critical severity
Unreviewed
Published
May 6, 2026
to the GitHub Advisory Database
•
Updated May 11, 2026
Description
Published by the National Vulnerability Database
May 6, 2026
Published to the GitHub Advisory Database
May 6, 2026
Last updated
May 11, 2026
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix signededness bug in smb_direct_prepare_negotiation()
smb_direct_prepare_negotiation() casts an unsigned __u32 value
from sp->max_recv_size and req->preferred_send_size to a signed
int before computing min_t(int, ...). A maliciously provided
preferred_send_size of 0x80000000 will return as smaller than
max_recv_size, and then be used to set the maximum allowed
alowed receive size for the next message.
By sending a second message with a large value (>1420 bytes)
the attacker can then achieve a heap buffer overflow.
This fix replaces min_t(int, ...) with min_t(u32)
References