PT-2025-33600 · Linux +2 · Linux Kernel +2
Published
2025-08-16
·
Updated
2025-10-04
·
CVE-2023-4130
CVSS v3.1
5.5
5.5
Medium
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Linux Kernel (affected versions not specified)
Description
The Linux kernel contains a flaw within the ksmbd component related to incorrect length validation of extended attribute (ea) buffers during SMB2 file operation handling. Specifically, the issue resides in the
smb2 set ea() function. Multiple smb2 ea info buffers are present in a FILE FULL EA INFORMATION request from a client. The ksmbd component uses the NextEntryOffset field to locate the next smb2 ea info entry. The validation process incorrectly uses the next variable instead of buf len to determine the buffer length before accessing the next extended attribute, potentially leading to a buffer overflow. The next variable represents the starting offset of the current extended attribute obtained from the previous one.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
CVE-2023-4130
SUSE-SU-2025:03301-1
Affected Products
Astra Linux
Debian
Linux Kernel
References · 253
- https://nvd.nist.gov/vuln/detail/CVE-2023-4130 · Security Note
- https://wiki.astralinux.ru/pages/viewpage.action?pageId=158612043 · Vendor Advisory
- https://osv.dev/vulnerability/DEBIAN-CVE-2023-4130 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2023-4130 · Vendor Advisory
- https://osv.dev/vulnerability/BELL-CVE-2023-4130 · Vendor Advisory
- https://ubuntu.com/security/CVE-2023-4130 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-4130 · Vendor Advisory
- https://git.kernel.org/stable/c/f339d76a3a972601d0738b881b099d49ebbdc3a2 · Patch
- https://git.kernel.org/stable/c/aeb974907642be095e38ecb1a400ca583958b2b0 · Patch
- https://git.kernel.org/stable/c/79ed288cef201f1f212dfb934bcaac75572fb8f6 · Patch
- https://security-tracker.debian.org/tracker/CVE-2023-4130 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4130 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2025:03301-1 · Vendor Advisory
- https://git.kernel.org/stable/c/4bf629262f9118ee91b1c3a518ebf2b3bcb22180 · Patch
- https://security-tracker.debian.org/tracker/source-package/linux · Vendor Advisory