Description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION

Use sb->s_uuid for a proper volume identifier as the primary choice.
For filesystems that do not provide a UUID, fall back to stfs.f_fsid
obtained from vfs_statfs().
Published: 2026-04-06
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Potential SMB share misidentification due to incorrect volume ID usage
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Linux kernel stems from the ksmbd service incorrectly handling volume identifiers in FS_OBJECT_ID_INFORMATION. Rather than reliably using the filesystem's UUID, it may fall back to the filesystem's fsid from vfs_statfs(), which can be ambiguous or improperly formatted. This flaw can cause SMB shares to be exposed with incorrect or duplicate identifiers, potentially leading to confusion over which share a client accesses or allowing an attacker to infer information about the underlying filesystem. The flaw is limited to the volume identification logic used by ksmbd and does not appear to provide a direct exploit vector for code execution or privilege escalation.

Affected Systems

All Linux systems running a kernel version that has not incorporated the patch referenced by commit identification data. The fix is incorporated in Linux kernel releases after the commits listed in the references, covering all mainstream Linux distributions that ship the kernel. No specific version string was supplied, so administrators should verify that their installed kernel includes the changes.

Risk and Exploitability

The EPSS score is below 1 % and the vulnerability is not present in the CISA KEV catalog, indicating a low probability of exploitation. No publicly documented exploits exist, and the CVSS score was not provided. Attack feasibility would likely require an adversary who can interact with ksmbd over SMB and manipulate volume identifiers, which typically necessitates local or network-level access to the target system. As a result, the risk is considered moderate at most, with the primary concern being inadvertent exposure or mislabeling of shares rather than direct compromise.

Generated by OpenCVE AI on April 7, 2026 at 09:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to the latest stable release that includes the ksmbd volume UUID fix.
  • Verify that your distribution’s kernel package reflects the patch commit referenced in the advisory.
  • If you cannot upgrade immediately, restrict SMB traffic to trusted hosts and monitor for any anomalous share names.
  • Apply any additional vendor-specific mitigations if provided in future advisories.

Generated by OpenCVE AI on April 7, 2026 at 09:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-318

Tue, 07 Apr 2026 00:00:00 +0000


Mon, 06 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION Use sb->s_uuid for a proper volume identifier as the primary choice. For filesystems that do not provide a UUID, fall back to stfs.f_fsid obtained from vfs_statfs().
Title ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:08:38.854Z

Reserved: 2026-03-09T15:48:24.087Z

Link: CVE-2026-31410

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T08:16:39.117

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-31410

cve-icon Redhat

Severity :

Publid Date: 2026-04-06T00:00:00Z

Links: CVE-2026-31410 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:52:35Z

Weaknesses