A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2023-4458 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2325516 | Issue Tracking Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-590/ | Third Party Advisory |
Configurations
History
05 Aug 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2023-4458 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2325516 - Issue Tracking, Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-590/ - Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
15 Nov 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
14 Nov 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-14 12:15
Updated : 2025-08-19 17:32
NVD link : CVE-2023-4458
Mitre link : CVE-2023-4458
CVE.ORG link : CVE-2023-4458
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read