Bug 2388958 (CVE-2023-4130) - CVE-2023-4130 kernel: ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()
Summary: CVE-2023-4130 kernel: ksmbd: fix wrong next length validation of ea buffer in...
Keywords:
Status: NEW
Alias: CVE-2023-4130
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-08-16 14:01 UTC by OSIDB Bzimport
Modified: 2025-08-20 12:20 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-08-16 14:01:18 UTC
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()

There are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request
from client. ksmbd find next smb2_ea_info using ->NextEntryOffset of
current smb2_ea_info. ksmbd need to validate buffer length Before
accessing the next ea. ksmbd should check buffer length using buf_len,
not next variable. next is the start offset of current ea that got from
previous ea.


Note You need to log in before you can comment on or make changes to this bug.