Description
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION

Use sb->s_uuid for a proper volume identifier as the primary choice.
For filesystems that do not provide a UUID, fall back to stfs.f_fsid
obtained from vfs_statfs().
Published: 2026-04-06
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The reported issue in the Linux kernel concerns the ksmbd SMB service’s handling of volume identifiers when responding to FS_OBJECT_ID_INFORMATION requests. The code originally relied on an incorrect source of volume data, and the new commit changes the logic to use the filesystem’s UUID (sb->s_uuid) as the primary identifier, falling back to the filesystem ID obtained from vfs_statfs() when a UUID is unavailable. This change is intended to correct the misuse of structure data that could result in malformed or duplicated volume identifiers being returned to SMB clients.

Affected Systems

Administrators should note that all Linux kernels before the patch are affected. The fix is incorporated in the mainline kernel following commit 3a641257..., and applies to all releases that ship the kernel, including versions 7.0 RC1–RC4 and later stable releases. Anyone running a kernel that lacks the updated ksmbd logic is potentially exposed to the incorrect volume identifier behavior. Checking the kernel version and ensuring it includes the relevant commit is necessary for remediation.

Risk and Exploitability

The CVSS score assigned to this vulnerability is 5.5, reflecting a moderate impact. The EPSS score is less than 1 %, indicating a low probability that attackers will target this weakness. It is not listed in the CISA KEV catalog, and no public exploits have been reported. An attacker would need the ability to interact with the ksmbd service over SMB to provoke the flaw, which generally requires network or local access. Consequently, the risk is considered low to moderate, mainly concerning potential confusion or misidentification of shares rather than direct compromise.

Generated by OpenCVE AI on May 20, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that contains the ksmbd volume UUID fix
  • Limit SMB traffic to known, trusted hosts by configuring firewall rules or network segmentation
  • Monitor SMB share listings for unexpected duplicate or incorrect identifiers to detect configuration issues

Generated by OpenCVE AI on May 20, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Wed, 20 May 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-318

Tue, 07 Apr 2026 00:00:00 +0000


Mon, 06 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION Use sb->s_uuid for a proper volume identifier as the primary choice. For filesystems that do not provide a UUID, fall back to stfs.f_fsid obtained from vfs_statfs().
Title ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:08:10.290Z

Reserved: 2026-03-09T15:48:24.087Z

Link: CVE-2026-31410

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T08:16:39.117

Modified: 2026-05-20T16:11:09.233

Link: CVE-2026-31410

cve-icon Redhat

Severity :

Publid Date: 2026-04-06T00:00:00Z

Links: CVE-2026-31410 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T18:45:21Z

Weaknesses