PT-2025-33600 · Linux+3 · Linux Kernel+3

Published

2023-08-06

·

Updated

2025-10-17

·

CVE-2023-4130

CVSS v3.1

5.5

Medium

AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions Linux Kernel (affected versions not specified)
Description The Linux kernel contains a flaw within the ksmbd component related to incorrect length validation of extended attribute (ea) buffers during SMB2 file operation handling. Specifically, the issue resides in the smb2 set ea() function. Multiple smb2 ea info buffers are present in a FILE FULL EA INFORMATION request from a client. The ksmbd component uses the NextEntryOffset field to locate the next smb2 ea info entry. The validation process incorrectly uses the next variable instead of buf len to determine the buffer length before accessing the next extended attribute, potentially leading to a buffer overflow. The next variable represents the starting offset of the current extended attribute obtained from the previous one.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2026-03245
CVE-2023-4130
SUSE-SU-2025:03272-1
SUSE-SU-2025:03290-1
SUSE-SU-2025:03301-1
SUSE-SU-2025:03382-1
SUSE-SU-2025:03602-1
SUSE-SU-2025:03633-1
SUSE-SU-2025:03634-1
SUSE-SU-2025:20653-1
SUSE-SU-2025:20669-1
SUSE-SU-2025:20739-1
SUSE-SU-2025:20756-1
SUSE-SU-2025_03272-1
SUSE-SU-2025_03290-1
SUSE-SU-2025_03301-1
SUSE-SU-2025_03382-1

Affected Products

Astra Linux
Debian
Linux Kernel
Suse