Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43362
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-08 May, 2026 | 14:21
Updated At-11 May, 2026 | 22:23
Rejected At-
▼CVE Numbering Authority (CNA)
smb: client: fix in-place encryption corruption in SMB2_write()

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix in-place encryption corruption in SMB2_write() SMB2_write() places write payload in iov[1..n] as part of rq_iov. smb3_init_transform_rq() pointer-shares rq_iov, so crypt_message() encrypts iov[1] in-place, replacing the original plaintext with ciphertext. On a replayable error, the retry sends the same iov[1] which now contains ciphertext instead of the original data, resulting in corruption. The corruption is most likely to be observed when connections are unstable, as reconnects trigger write retries that re-send the already-encrypted data. This affects SFU mknod, MF symlinks, etc. On kernels before 6.10 (prior to the netfs conversion), sync writes also used this path and were similarly affected. The async write path wasn't unaffected as it uses rq_iter which gets deep-copied. Fix by moving the write payload into rq_iter via iov_iter_kvec(), so smb3_init_transform_rq() deep-copies it before encryption.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/client/smb2pdu.c
Default Status
unaffected
Versions
Affected
  • From 026e93dc0a3eefb0be060bcb9ecd8d7a7fd5c398 before 438e77435aee2894d5edf90be5c87004a57f6258 (git)
  • From 026e93dc0a3eefb0be060bcb9ecd8d7a7fd5c398 before 52327268224fb9ccc7ecfbbdfdfff54b6e93c518 (git)
  • From 026e93dc0a3eefb0be060bcb9ecd8d7a7fd5c398 before 92e64f1852f455f57d0850989e57c30d7fac7d95 (git)
  • From 026e93dc0a3eefb0be060bcb9ecd8d7a7fd5c398 before aea5e37388a080361110ab5790f57ae0af383650 (git)
  • From 026e93dc0a3eefb0be060bcb9ecd8d7a7fd5c398 before d78840a6a38d312dc1a51a65317bb67e46f0b929 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/smb/client/smb2pdu.c
Default Status
affected
Versions
Affected
  • 4.11
Unaffected
  • From 0 before 4.11 (semver)
  • From 6.6.130 through 6.6.* (semver)
  • From 6.12.78 through 6.12.* (semver)
  • From 6.18.19 through 6.18.* (semver)
  • From 6.19.9 through 6.19.* (semver)
  • From 7.0 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/438e77435aee2894d5edf90be5c87004a57f6258
N/A
https://git.kernel.org/stable/c/52327268224fb9ccc7ecfbbdfdfff54b6e93c518
N/A
https://git.kernel.org/stable/c/92e64f1852f455f57d0850989e57c30d7fac7d95
N/A
https://git.kernel.org/stable/c/aea5e37388a080361110ab5790f57ae0af383650
N/A
https://git.kernel.org/stable/c/d78840a6a38d312dc1a51a65317bb67e46f0b929
N/A
Hyperlink: https://git.kernel.org/stable/c/438e77435aee2894d5edf90be5c87004a57f6258
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/52327268224fb9ccc7ecfbbdfdfff54b6e93c518
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/92e64f1852f455f57d0850989e57c30d7fac7d95
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/aea5e37388a080361110ab5790f57ae0af383650
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d78840a6a38d312dc1a51a65317bb67e46f0b929
Resource: N/A
Details not found