๐Ÿ” CVE Alert

CVE-2026-43362

UNKNOWN 0.0

smb: client: fix in-place encryption corruption in SMB2_write()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix in-place encryption corruption in SMB2_write() SMB2_write() places write payload in iov[1..n] as part of rq_iov. smb3_init_transform_rq() pointer-shares rq_iov, so crypt_message() encrypts iov[1] in-place, replacing the original plaintext with ciphertext. On a replayable error, the retry sends the same iov[1] which now contains ciphertext instead of the original data, resulting in corruption. The corruption is most likely to be observed when connections are unstable, as reconnects trigger write retries that re-send the already-encrypted data. This affects SFU mknod, MF symlinks, etc. On kernels before 6.10 (prior to the netfs conversion), sync writes also used this path and were similarly affected. The async write path wasn't unaffected as it uses rq_iter which gets deep-copied. Fix by moving the write payload into rq_iter via iov_iter_kvec(), so smb3_init_transform_rq() deep-copies it before encryption.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 8, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 438e77435aee2894d5edf90be5c87004a57f6258 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 52327268224fb9ccc7ecfbbdfdfff54b6e93c518 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 92e64f1852f455f57d0850989e57c30d7fac7d95 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < aea5e37388a080361110ab5790f57ae0af383650 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d78840a6a38d312dc1a51a65317bb67e46f0b929
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/438e77435aee2894d5edf90be5c87004a57f6258 git.kernel.org: https://git.kernel.org/stable/c/52327268224fb9ccc7ecfbbdfdfff54b6e93c518 git.kernel.org: https://git.kernel.org/stable/c/92e64f1852f455f57d0850989e57c30d7fac7d95 git.kernel.org: https://git.kernel.org/stable/c/aea5e37388a080361110ab5790f57ae0af383650 git.kernel.org: https://git.kernel.org/stable/c/d78840a6a38d312dc1a51a65317bb67e46f0b929