CVE-2026-31409CVE-2026-31408CVE-2026-31406

Critical Linux Kernel Vulnerabilities Patched: SMB, Bluetooth, and xfrm

New Linux kernel vulnerabilities (CVE-2026-31409, CVE-2026-31408, CVE-2026-31406) impact SMB, Bluetooth, and xfrm. Patch immediately to prevent potential exploitation and system instability. #

Published on

Three critical vulnerabilities have been resolved in the Linux kernel, affecting the Samba SMB client (ksmbd), Bluetooth SCO subsystem, and the xfrm networking framework. These vulnerabilities could lead to denial-of-service or potentially more severe exploits. Patches are now available and should be applied promptly to mitigate the risks.

While CVSS scores are currently unavailable, the potential for exploitation and system instability warrants immediate attention and patching.

What is Linux?

Linux is an open-source operating system kernel, the core of many operating systems like Android and various Linux distributions (e.g., Ubuntu, Fedora). It manages the system's hardware resources and provides essential services for applications to run. Because it's so widely used, vulnerabilities in the Linux kernel can have a broad impact across many systems. Understanding the importance of Linux security is crucial for maintaining a secure infrastructure. You can search all linux CVEs to stay informed. see all linux CVEs

ksmbd: Unset conn->binding on Failed Binding Request

CVSSN/A
Affected versionsSystems running Linux kernels versions up to and including d073870dab8f6dadced81d13d273ff0b21cb7f4e are affected.

CVSS score not yet available.

EPSP percentage not yet available.

A flaw exists in the ksmbd component where the `conn->binding` flag is not properly cleared after a failed binding request. This can lead to subsequent SMB operations falling back to the global sessions table, potentially allowing unauthorized access or denial-of-service. An attacker could exploit this by crafting a malicious SMB2_SESSION_SETUP request.

How to fix CVE-2026-31409 in Linux

Patch immediately
  1. 1.Update your Linux kernel to version d073870dab8f6dadced81d13d273ff0b21cb7f4e or later.
Update Linux Kernel
composer update linux

Verify with:

verify
uname -r

NextGuard automatically flags CVE-2026-31409 if Linux appears in any of your monitored projects — no manual lookup required.

Bluetooth: SCO: Fix Use-After-Free in sco_recv_frame()

CVSSN/A
Affected versionsSystems running Linux kernels versions up to and including e76e8f0581ef555eacc11dbb095e602fb30a5361 are affected.

CVSS score not yet available.

EPSP percentage not yet available.

A use-after-free vulnerability exists in the Bluetooth SCO (Synchronous Connection-Oriented) subsystem within the `sco_recv_frame()` function. Due to a missing `sco_sock_hold()` call, the socket reference can be released concurrently while the function is still accessing it, leading to a crash or potential code execution. An attacker could trigger this by manipulating Bluetooth connections.

How to fix CVE-2026-31408 in Linux

Patch immediately
  1. 1.Update your Linux kernel to version e76e8f0581ef555eacc11dbb095e602fb30a5361 or later.
Update Linux Kernel
composer update linux

Verify with:

verify
uname -r

NextGuard automatically flags CVE-2026-31408 if Linux appears in any of your monitored projects — no manual lookup required.

xfrm: Fix Work Re-schedule After Cancel

CVSSN/A
Affected versionsSystems running Linux kernels versions up to and including daf8e3b253aa760ff9e96c7768a464bc1d6b3c90 are affected.

CVSS score not yet available.

EPSP percentage not yet available.

A race condition exists in the xfrm networking framework within the `xfrm_nat_keepalive_net_fini()` function. After canceling a delayed work item, the function attempts to re-schedule it, potentially on a freed network namespace, leading to a crash or other unexpected behavior. This can be triggered during network cleanup operations.

How to fix CVE-2026-31406 in Linux

Patch immediately
  1. 1.Update your Linux kernel to version daf8e3b253aa760ff9e96c7768a464bc1d6b3c90 or later.
Update Linux Kernel
composer update linux

Verify with:

verify
uname -r

NextGuard automatically flags CVE-2026-31406 if Linux appears in any of your monitored projects — no manual lookup required.

Stay ahead of Linux vulnerabilities

Proactively identify and address security risks in your Linux environment. Regularly updating your systems and monitoring your dependencies is essential for maintaining a secure posture. Monitor your linux dependencies to ensure you're always protected. monitor your linux dependencies

Compare Your Dependencies

Frequently asked questions

Addressing these Linux kernel vulnerabilities is crucial for maintaining a secure and stable system. Ensure you apply the necessary patches promptly and regularly monitor your systems for new vulnerabilities. See all linux vulnerabilities to stay informed. see all linux vulnerabilities

Related topics

Linux KernelSMBBluetoothxfrmVulnerability PatchingSecurity Updates