CVE-2026-31717
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: validate owner of durable handle on reconnect<br />
<br />
Currently, ksmbd does not verify if the user attempting to reconnect<br />
to a durable handle is the same user who originally opened the file.<br />
This allows any authenticated user to hijack an orphaned durable handle<br />
by predicting or brute-forcing the persistent ID.<br />
<br />
According to MS-SMB2, the server MUST verify that the SecurityContext<br />
of the reconnect request matches the SecurityContext associated with<br />
the existing open.<br />
Add a durable_owner structure to ksmbd_file to store the original opener&#39;s<br />
UID, GID, and account name. and catpure the owner information when a file<br />
handle becomes orphaned. and implementing ksmbd_vfs_compare_durable_owner()<br />
to validate the identity of the requester during SMB2_CREATE (DHnC).
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.32 (including) | 6.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.18.25 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 7.0.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



