CVE-2026-31693
Published: Thu, 30 Apr 2026 12:16
Summary
In the Linux kernel, the following vulnerability has been resolved: cifs: some missing initializations on replay In several places in the code, we have a label to signify the start of the code where
Details
In the Linux kernel, the following vulnerability has been resolved: cifs: some missing initializations on replay In several places in the code, we have a label to signify the start of the code where a request can be replayed if necessary. However, some of these places were missing the necessary reinitializations of certain local variables before replay. This change makes sure that these variables get initialized after the label.
Are YOU affected by CVE-2026-31693?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31693 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/14f66f44646333d2bfd7ece36585874fd72f8286
- https://git.kernel.org/stable/c/1d731e512134495e0ef490ade0e4d91dc0d515ec
- https://git.kernel.org/stable/c/7c9ce68192eef14c777cb6ce17155d2eb2431aea
- https://git.kernel.org/stable/c/c854ab481ece4b3e5f4c2e8b22824f015ff874a5
- https://git.kernel.org/stable/c/c99e160938b627f6f28edee930e8abc157e84386
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.