Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2026-31718

CVE-2026-31718 linux
Back to all
CVE

CVE-2026-31718

CVE-2026-31718 linux

In the Linux kernel, the following vulnerability has been resolved:  ksmbd: fix use-after-free in ksmbdclosefd() via durable scavenger  When a durable file handle survives session disconnect (TCP close without SMB2LOGOFF), sessionfdcheck() sets fp->conn = NULL to preserve the handle for later reconnection. However, it did not clean up the byte-range locks on fp->locklist.  Later, when the durable scavenger thread times out and calls ksmbdclosefd(NULL, fp), the lock cleanup loop did:      spinlock(&fp->conn->llistlock);  This caused a slab use-after-free because fp->conn was NULL and the original connection object had already been freed by ksmbdtcpdisconnect().  The root cause is asymmetric cleanup: lock entries (smblock->clist) were left dangling on the freed conn->locklist while fp->conn was nulled out.  To fix this issue properly, we need to handle the lifetime of smblock->clist across three paths:  - Safely skip clist deletion when list is empty and fp->conn is NULL.  - Remove the lock from the old connection's locklist in    sessionfdcheck()  - Re-add the lock to the new connection's locklist in    ksmbdreopendurablefd().

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
9.8
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
C
H
U
-
C
H
U
-

Related Resources

No items found.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31718

Severity

9.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
9.8
EPSS Probability
0.00018%
EPSS Percentile
0.0466%
Introduced Version
0
Fix Available
6.12.85-1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading