In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()
There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request
from client. ksmbd find next smb2_ea_info using ->NextEntryOffset of
current smb2_ea_info. ksmbd need to validate buffer length Before
accessing the next ea. ksmbd should check buffer length using buf_len,
not next variable. next is the start offset of current ea that got from
previous ea.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea() There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request from client. ksmbd find next smb2_ea_info using ->NextEntryOffset of current smb2_ea_info. ksmbd need to validate buffer length Before accessing the next ea. ksmbd should check buffer length using buf_len, not next variable. next is the start offset of current ea that got from previous ea. | |
Title | ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-08-16T13:27:58.227Z
Updated: 2025-08-16T13:27:58.227Z
Reserved: 2023-08-03T08:12:08.227Z
Link: CVE-2023-4130

No data.

Status : Received
Published: 2025-08-16T14:15:27.640
Modified: 2025-08-16T14:15:27.640
Link: CVE-2023-4130

No data.