In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()
There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request
from client. ksmbd find next smb2_ea_info using ->NextEntryOffset of
current smb2_ea_info. ksmbd need to validate buffer length Before
accessing the next ea. ksmbd should check buffer length using buf_len,
not next variable. next is the start offset of current ea that got from
previous ea.
References
Configurations
Configuration 1 (hide)
|
History
18 Nov 2025, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/4bf629262f9118ee91b1c3a518ebf2b3bcb22180 - Patch | |
| References | () https://git.kernel.org/stable/c/79ed288cef201f1f212dfb934bcaac75572fb8f6 - Patch | |
| References | () https://git.kernel.org/stable/c/aeb974907642be095e38ecb1a400ca583958b2b0 - Patch | |
| References | () https://git.kernel.org/stable/c/f339d76a3a972601d0738b881b099d49ebbdc3a2 - Patch | |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:* |
18 Aug 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Aug 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-16 14:15
Updated : 2025-11-18 17:58
NVD link : CVE-2023-4130
Mitre link : CVE-2023-4130
CVE.ORG link : CVE-2023-4130
JSON object : View
Products Affected
linux
- linux_kernel
CWE
