CVE-2026-23220
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/02/2026
Last modified:
18/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths<br />
<br />
The problem occurs when a signed request fails smb2 signature verification<br />
check. In __process_request(), if check_sign_req() returns an error,<br />
set_smb2_rsp_status(work, STATUS_ACCESS_DENIED) is called.<br />
set_smb2_rsp_status() set work->next_smb2_rcv_hdr_off as zero. By resetting<br />
next_smb2_rcv_hdr_off to zero, the pointer to the next command in the chain<br />
is lost. Consequently, is_chained_smb2_message() continues to point to<br />
the same request header instead of advancing. If the header&#39;s NextCommand<br />
field is non-zero, the function returns true, causing __handle_ksmbd_work()<br />
to repeatedly process the same failed request in an infinite loop.<br />
This results in the kernel log being flooded with "bad smb2 signature"<br />
messages and high CPU usage.<br />
<br />
This patch fixes the issue by changing the return value from<br />
SERVER_HANDLER_CONTINUE to SERVER_HANDLER_ABORT. This ensures that<br />
the processing loop terminates immediately rather than attempting to<br />
continue from an invalidated offset.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.145 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.71 (including) | 6.1.164 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.1 (including) | 6.6.125 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.72 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.1 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.6:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.6:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/010eb01ce23b34b50531448b0da391c7f05a72af
- https://git.kernel.org/stable/c/5accdc5b7f28a81bbc5880ac0b8886e60c86e8c8
- https://git.kernel.org/stable/c/71b5e7c528315ca360a1825a4ad2f8ae48c5dc16
- https://git.kernel.org/stable/c/9135e791ec2709bcf0cda0335535c74762489498
- https://git.kernel.org/stable/c/f7b1c2f5642bbd60b1beef1f3298cbac81eb232c
- https://git.kernel.org/stable/c/fb3b66bd72deb5543addaefa67963b34fb163a7b



