CVE-2026-31717
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: validate owner of durable handle on reconnect<br />
<br />
Currently, ksmbd does not verify if the user attempting to reconnect<br />
to a durable handle is the same user who originally opened the file.<br />
This allows any authenticated user to hijack an orphaned durable handle<br />
by predicting or brute-forcing the persistent ID.<br />
<br />
According to MS-SMB2, the server MUST verify that the SecurityContext<br />
of the reconnect request matches the SecurityContext associated with<br />
the existing open.<br />
Add a durable_owner structure to ksmbd_file to store the original opener&#39;s<br />
UID, GID, and account name. and catpure the owner information when a file<br />
handle becomes orphaned. and implementing ksmbd_vfs_compare_durable_owner()<br />
to validate the identity of the requester during SMB2_CREATE (DHnC).
Impacto
Puntuación base 3.x
8.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.32 (incluyendo) | 6.7 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (incluyendo) | 6.18.25 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (incluyendo) | 7.0.2 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



