CVE-2026-43362
Buffer Overflow in Linux Kernel SMB Client
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 6.10 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's SMB client implementation, specifically in the SMB2_write() function. The issue arises because the write payload is placed in a shared memory area (iov[1..n]) that is pointer-shared during encryption. When an error occurs that allows a retry, the retry sends the already-encrypted data instead of the original plaintext, causing data corruption.
The problem is most noticeable when network connections are unstable, as reconnects trigger write retries that resend ciphertext instead of the original data. The fix involves deep-copying the write payload before encryption to prevent in-place corruption.
How can this vulnerability impact me? :
This vulnerability can lead to data corruption during SMB write operations, especially in unstable network conditions where retries occur. The corrupted data can affect file operations such as SFU mknod and MF symlinks, potentially causing loss or alteration of important data.
If your system relies on SMB for file sharing or network storage, this could result in unreliable data writes and integrity issues.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed in Linux kernel version 6.10 and later. To mitigate this vulnerability, you should update your Linux kernel to version 6.10 or a later release that includes the fix.
The fix involves correcting the in-place encryption corruption in SMB2_write() by deep-copying the write payload before encryption, preventing corrupted data retransmission on retries.