Directory Entry Overflow in Linux Kernel FUSE Implementation
CVE-2026-31694

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
1 May 2026

What is CVE-2026-31694?

The Linux kernel's implementation of FUSE is vulnerable to a directory entry overflow due to improper validation of serialized directory entries. Specifically, the function fuse_add_dirent_to_cache() fails to verify whether a directory entry exceeds the maximum allowable size, allowing a malicious FUSE server to craft oversized directory entries. This oversight can lead to memory overflow situations, compromising the integrity of the kernel's memory management. By rejecting oversized directory entries prior to caching them, a more secure approach can effectively mitigate such vulnerabilities, safeguarding system stability and reliability.

Affected Version(s)

Linux 69e34551152a286f827d54dcb5700da6aeaac1fb

Linux 69e34551152a286f827d54dcb5700da6aeaac1fb < 45c05af36311624c1148123caeb011312495d86b

Linux 69e34551152a286f827d54dcb5700da6aeaac1fb < 7de93abfaae1b2dc94da8a07a36421bd073f1d8f

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.