CVE-2023-4130
BaseFortify
Publication date: 2025-08-16
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | 6.5 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's ksmbd component, specifically in the smb2_set_ea() function. It involves incorrect validation of the next length of the extended attribute (ea) buffer when processing multiple smb2_ea_info buffers in a FILE_FULL_EA_INFORMATION request from a client. The code incorrectly uses the 'next' variable, which is the start offset of the current ea, instead of validating the buffer length using the actual buffer length (buf_len). This improper validation could lead to incorrect handling of the ea buffers.
How can this vulnerability impact me? :
The vulnerability could potentially lead to improper processing of extended attribute buffers in SMB2 requests, which might cause unexpected behavior or errors in the ksmbd service. However, specific impacts such as data corruption, denial of service, or security breaches are not detailed in the provided information.