Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2263 articles · 104394 vulns · 38/41 feeds (7d)
← Back to list
7.5
CVE-2026-31410EXPLOITEDPATCHED
Linux · Linux

ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION Use sb->s_uuid for a proper volume identifier as the primary choice. For filesystems that do not provide a UUID, fall back to stfs.f_fsid obtained from vfs_statfs().

Affected Products

VendorProductVersions
LinuxLinux1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%

References

  • https://git.kernel.org/stable/c/ce00616bc1df675bfdacc968f2bf7c51f4669227
  • https://git.kernel.org/stable/c/3d80ebe6d1b7bc9ad20fd9b0c1a0c56d804f8a0a
  • https://git.kernel.org/stable/c/c283a6ffe6d5d6e5594d991286b9ce15951572e1
  • https://git.kernel.org/stable/c/3a64125730cabc34fccfbc230c2667c2e14f7308

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-31410 | Linux Kernel up to 6.12.77/6.18.19/6.19.9/7.0-rc4 ksmbd vfs_statfs privilege escalation
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-31410: ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
→ No new info (linked only)
CVSS 3.17.5 NONE
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
ce00616bc1df675bfdacc968f2bf7c51f46692273d80ebe6d1b7bc9ad20fd9b0c1a0c56d804f8a0ac283a6ffe6d5d6e5594d991286b9ce15951572e13a64125730cabc34fccfbc230c2667c2e14f73086.12.786.18.206.19.107.0-rc5
PublishedApr 6, 2026
Last enriched4h agov3
Trending Score50
Source articles2
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23444EXP
wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
Trending: 55
NONECVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 47
CRITICALCVE-2026-23442
ipv6: add NULL checks for idev in SRv6 paths
Trending: 40
CRITICALCVE-2026-23473
io_uring/poll: fix multishot recv missing EOF on wakeup race
Trending: 40
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 39

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 6, 2026
Discovered by ZDM
Apr 6, 2026
Updated: cvssEstimate, cweIds
Apr 6, 2026
Updated: description, severity, affectedVersions, activelyExploited
Apr 6, 2026
Actively Exploited
Apr 6, 2026
Patch Available
Apr 6, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to CRITICAL, added affected versions, and provided a new description detailing privilege escalation.

descriptionseverityaffectedVersionsactivelyExploited
via VulDB
v2Tier C5h ago

Updated severity to HIGH, added CVSS estimate of 7.5, and marked the vulnerability as actively exploited with a new CWE ID.

cvssEstimatecweIds
via Linux Kernel CVEs
v15h ago

Initial creation