Improper access control in Linux kernel - CVE-2026-31476
Published: April 24, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper access control in ksmbd session binding handling when processing a multichannel session binding request failure. A remote attacker can send a binding request with a wrong password to cause a denial of service.
The issue occurs because the target session looked up during binding can belong to another connection's user.
How to mitigate CVE-2026-31476
Sources
- https://git.kernel.org/stable/c/1d1888b4a7aec518b707f6eca0bf08992c0e8da3
- https://git.kernel.org/stable/c/6fafc4c4238e538969f1375f9ecdc6587c53f1cc
- https://git.kernel.org/stable/c/9bbb19d21ded7d78645506f20d8c44895e3d0fb9
- https://git.kernel.org/stable/c/a897064a457056acb976e20e3007cdf553de340f
- https://git.kernel.org/stable/c/e0e5edc81b241c70355217de7e120c97c3429deb
- https://git.kernel.org/stable/c/f5300690c23c5ac860499bb37dbc09cf43fd62e6