Description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: unset conn->binding on failed binding request

When a multichannel SMB2_SESSION_SETUP request with
SMB2_SESSION_REQ_FLAG_BINDING fails ksmbd sets conn->binding = true
but never clears it on the error path. This leaves the connection in
a binding state where all subsequent ksmbd_session_lookup_all() calls
fall back to the global sessions table. This fix it by clearing
conn->binding = false in the error path.
Published: 2026-04-06
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Improper handling of the binding flag in Linux ksmbd leading to failed session lookups and potential denial of service
Action: Apply patch
AI Analysis

Impact

In the Linux kernel’s SMB server component, an error path for SMB2_SESSION_SETUP requests that include the binding flag fails to clear the per‑connection binding indicator. The leftover flag causes subsequent session‑lookup functions to fall back to a global table rather than the per‑connection context, which can result in incorrect session matching and potential resource exhaustion. This flaw reflects a failure to handle an error condition (CWE‑390) and could be leveraged by an attacker to disrupt SMB services or consume kernel resources. The impact is confined to systems running a kernel that has not yet incorporated the patch that resets the binding flag.

Affected Systems

All Linux kernel installations that include the ksmbd SMB server are affected; no specific kernel releases are enumerated, indicating that any unfixed kernel could be vulnerable. This includes standard distributions whose kernels expose SMB port 445.

Risk and Exploitability

The CVSS score of 8.8 classifies the issue as high severity, yet the EPSS score of less than 1 % and the absence from the CISA KEV catalog suggest that exploitation is currently unlikely. The likely attack vector involves sending a malformed SMB2 request to a publicly reachable ksmbd instance; success would force the server into a repeated misclassification of session lookups, potentially leading to denial of service. No publicly demonstrated exploit is known, but the vulnerability remains relevant if the service is exposed.

Generated by OpenCVE AI on April 28, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the ksmbd binding‑flag reset patch
  • If a kernel upgrade cannot be applied immediately, stop or disable the ksmbd service to remove the vulnerable functionality
  • Configure firewall rules to block inbound SMB traffic (TCP 445) from untrusted networks until the patch is applied

Generated by OpenCVE AI on April 28, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 07 Apr 2026 00:00:00 +0000


Mon, 06 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: unset conn->binding on failed binding request When a multichannel SMB2_SESSION_SETUP request with SMB2_SESSION_REQ_FLAG_BINDING fails ksmbd sets conn->binding = true but never clears it on the error path. This leaves the connection in a binding state where all subsequent ksmbd_session_lookup_all() calls fall back to the global sessions table. This fix it by clearing conn->binding = false in the error path.
Title ksmbd: unset conn->binding on failed binding request
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-27T14:02:56.938Z

Reserved: 2026-03-09T15:48:24.087Z

Link: CVE-2026-31409

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T08:16:38.943

Modified: 2026-04-27T14:16:37.107

Link: CVE-2026-31409

cve-icon Redhat

Severity :

Publid Date: 2026-04-06T00:00:00Z

Links: CVE-2026-31409 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T21:45:26Z

Weaknesses