CVE-2026-23220

Source
https://cve.org/CVERecord?id=CVE-2026-23220
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23220.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23220
Downstream
Related
Published
2026-02-18T14:53:23.376Z
Modified
2026-03-19T08:59:07.550280Z
Summary
ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
Details

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix infinite loop caused by nextsmb2rcvhdroff reset in error paths

The problem occurs when a signed request fails smb2 signature verification check. In __processrequest(), if checksignreq() returns an error, setsmb2rspstatus(work, STATUSACCESSDENIED) is called. setsmb2rspstatus() set work->nextsmb2rcvhdroff as zero. By resetting nextsmb2rcvhdroff to zero, the pointer to the next command in the chain is lost. Consequently, ischainedsmb2message() continues to point to the same request header instead of advancing. If the header's NextCommand field is non-zero, the function returns true, causing __handleksmbdwork() to repeatedly process the same failed request in an infinite loop. This results in the kernel log being flooded with "bad smb2 signature" messages and high CPU usage.

This patch fixes the issue by changing the return value from SERVERHANDLERCONTINUE to SERVERHANDLERABORT. This ensures that the processing loop terminates immediately rather than attempting to continue from an invalidated offset.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23220.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
943cebf9ea3415ddefcd670d24d8883e97ba3d60
Fixed
fb3b66bd72deb5543addaefa67963b34fb163a7b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be0f89d4419dc5413a1cf06db3671c9949be0d52
Fixed
5accdc5b7f28a81bbc5880ac0b8886e60c86e8c8
Fixed
f7b1c2f5642bbd60b1beef1f3298cbac81eb232c
Fixed
71b5e7c528315ca360a1825a4ad2f8ae48c5dc16
Fixed
9135e791ec2709bcf0cda0335535c74762489498
Fixed
010eb01ce23b34b50531448b0da391c7f05a72af
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
4b9b7ea1ffb1e34f01fa5726d0c184931b9ba565

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23220.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.164
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.125
Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.12.72
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.18.11
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.19.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23220.json"