CVE-2026-31611 - Vulnerability Analysis
HighCVSS: 8.6Last Updated: April 27, 2026
Linux Kernel ksmbd - Out-of-Bounds Read
Published: April 24, 2026Updated: April 27, 2026Remote Exploitable
Overview
Linux kernel ksmbd contains an out-of-bounds read caused by insufficient sub-authority checks in parse_dacl when reading sub_auth[2], letting attackers influence file mode settings, exploit requires crafted ACE with specific SID.
Severity & Score
Severity: High
CVSS Score: 8.6
Impact
Attackers can cause incorrect file mode settings by reading out-of-bounds memory, potentially leading to privilege or access control issues.
Mitigation
Update to the latest Linux kernel version containing the fix.
References
- https://git.kernel.org/stable/c/b5b5d5936a50497fb151c0b122899a6894721c2b
- https://git.kernel.org/stable/c/08f9e6d899b5c834bbcc239eae1bed58d9b15d2c
- https://git.kernel.org/stable/c/46bbcd3ebfb3549c8da1838fc4493e79bd3241e7
- https://git.kernel.org/stable/c/9401f86a224f37b50e6a3ccf1d46a70d5ef8af0a
- https://git.kernel.org/stable/c/d2454f4a002d08560a60f214f392e6491cf11560
- https://git.kernel.org/stable/c/53370cf9090777774e07fd9a8ebce67c6cc333ab
Related Resources
Details
- CVE ID
- CVE-2026-31611
- Severity
- High
- CVSS Score
- 8.6
- Type
- undefined
- Status
- unconfirmed
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H