CVE-2026-31409

medium

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: unset conn->binding on failed binding request When a multichannel SMB2_SESSION_SETUP request with SMB2_SESSION_REQ_FLAG_BINDING fails ksmbd sets conn->binding = true but never clears it on the error path. This leaves the connection in a binding state where all subsequent ksmbd_session_lookup_all() calls fall back to the global sessions table. This fix it by clearing conn->binding = false in the error path.

References

https://git.kernel.org/stable/c/d073870dab8f6dadced81d13d273ff0b21cb7f4e

https://git.kernel.org/stable/c/9feb2d1bf86d9e5e66b8565f37f8d3a7d281a772

https://git.kernel.org/stable/c/89afe5e2dbea6e9d8e5f11324149d06fa3a4efca

https://git.kernel.org/stable/c/6ebef4a220a1ebe345de899ebb9ae394206fe921

https://git.kernel.org/stable/c/6260fc85ed1298a71d24a75d01f8b2e56d489a60

https://git.kernel.org/stable/c/282343cf8a4a5a3603b1cb0e17a7083e4a593b03

Details

Source: Mitre, NVD

Published: 2026-04-06

Updated: 2026-04-06

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.0001