CVE-2023-54250 — Linux vulnerability
7 documents6 sources
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: avoid out of bounds access in decode_preauth_ctxt()
Confirm that the accessed pneg_ctxt->HashAlgorithms address sits within
the SMB request boundary; deassemble_neg_contexts() only checks that the
eight byte smb2_neg_context header + (client controlled) DataLength are
within the packet boundary, which is insufficient.
Checking for sizeof(struct smb2_preauth_neg_context) is overkill given
that the type currently assumes…
Affected Packages4 packages
▶CVEListV5linux/linuxe2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 — 39f5b4b313b445c980a2a295bed28228c29228ed+4
🔴Vulnerability Details
3OSV▶
CVE-2023-54250: In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds access in decode_preauth_ctxt() Confirm that the access↗2025-12-30
GHSA▶
GHSA-f39w-x49r-j8p2: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: avoid out of bounds access in decode_preauth_ctxt()
Confirm that the acce↗2025-12-30