PT-2026-30185 · Linux+1 · Linux Kernel+1

Published

2026-02-24

·

Updated

2026-05-05

·

CVE-2026-31402

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description The Linux kernel’s Network File System daemon (nfsd) contained a heap overflow in the NFSv4.0 LOCK replay cache. The NFSv4.0 replay cache uses a fixed 112-byte inline buffer to store encoded operation responses. This size was insufficient for LOCK denied responses, which can include a variable-length lock owner field up to 1024 bytes. When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, the encoded response is copied into the undersized replay buffer without bounds checking, leading to a heap overflow of up to 944 bytes. This issue can be triggered remotely by an unauthenticated attacker using two cooperating NFSv4.0 clients. One client sets a lock with a large owner string, and the other requests a conflicting lock to provoke the denial.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Weakness Enumeration

Related Identifiers

ALSA-2026:13565
ALSA-2026:13566
ALSA-2026:13577
ALSA-2026:13578
BDU:2026-05258
CVE-2026-31402
ECHO-E29E-D594-D326
OESA-2026-2075
OESA-2026-2077
RHSA-2026:10108
RHSA-2026:11313
RHSA-2026:13565
RHSA-2026:13566
RHSA-2026:13577
RHSA-2026:13578
RHSA-2026:13664
RHSA-2026:13681
RHSA-2026:13734
RHSA-2026:13936
RHSA-2026:14137
RHSA-2026:14165
RHSA-2026:14301
RHSA-2026:14823
RHSA-2026:14869
RHSA-2026:14925

Affected Products

Linux Kernel
Rocky Linux