PT-2025-33600 · Linux +2 · Linux Kernel +2

Published

2025-08-16

·

Updated

2025-10-04

·

CVE-2023-4130

CVSS v3.1
5.5
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions Linux Kernel (affected versions not specified)
Description The Linux kernel contains a flaw within the ksmbd component related to incorrect length validation of extended attribute (ea) buffers during SMB2 file operation handling. Specifically, the issue resides in the
smb2 set ea()
function. Multiple
smb2 ea info
buffers are present in a
FILE FULL EA INFORMATION
request from a client. The ksmbd component uses the
NextEntryOffset
field to locate the next
smb2 ea info
entry. The validation process incorrectly uses the
next
variable instead of
buf len
to determine the buffer length before accessing the next extended attribute, potentially leading to a buffer overflow. The
next
variable represents the starting offset of the current extended attribute obtained from the previous one.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2023-4130
SUSE-SU-2025:03301-1

Affected Products

Astra Linux
Debian
Linux Kernel