CVE-2025-68806 (GCVE-0-2025-68806)
Vulnerability from cvelistv5
Published
2026-01-13 15:29
Modified
2026-02-09 08:33
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix buffer validation by including null terminator size in EA length The smb2_set_ea function, which handles Extended Attributes (EA), was performing buffer validation checks that incorrectly omitted the size of the null terminating character (+1 byte) for EA Name. This patch fixes the issue by explicitly adding '+ 1' to EaNameLength where the null terminator is expected to be present in the buffer, ensuring the validation accurately reflects the total required buffer size.
Impacted products
Vendor Product Version
Linux Linux Version: d070c4dd2a5bed4e9832eec5b6c029c7d14892ea
Version: 0ba5439d9afa2722e7728df56f272c89987540a4
Version: 0ba5439d9afa2722e7728df56f272c89987540a4
Version: 0ba5439d9afa2722e7728df56f272c89987540a4
Version: 0ba5439d9afa2722e7728df56f272c89987540a4
Version: bb5bf157b5be1643cccc7cbbe57fcdef9ae52c2c
Version: 1a13ecb96230e8b7b91967e292836f7b01ec8111
Version: 404e7c01e16288b5e0171d1d8fd3328e806d0794
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/smb/server/smb2pdu.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "cae52c592a07e1d3fa3338a5f064a374a5f26750",
              "status": "affected",
              "version": "d070c4dd2a5bed4e9832eec5b6c029c7d14892ea",
              "versionType": "git"
            },
            {
              "lessThan": "a28a375a5439eb474e9f284509a407efb479c925",
              "status": "affected",
              "version": "0ba5439d9afa2722e7728df56f272c89987540a4",
              "versionType": "git"
            },
            {
              "lessThan": "d26af6d14da43ab92d07bc60437c62901dc522e6",
              "status": "affected",
              "version": "0ba5439d9afa2722e7728df56f272c89987540a4",
              "versionType": "git"
            },
            {
              "lessThan": "6dc8cf6e7998ef7aeb9383a4c2904ea5d22fa2e4",
              "status": "affected",
              "version": "0ba5439d9afa2722e7728df56f272c89987540a4",
              "versionType": "git"
            },
            {
              "lessThan": "95d7a890e4b03e198836d49d699408fd1867cb55",
              "status": "affected",
              "version": "0ba5439d9afa2722e7728df56f272c89987540a4",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "bb5bf157b5be1643cccc7cbbe57fcdef9ae52c2c",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "1a13ecb96230e8b7b91967e292836f7b01ec8111",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "404e7c01e16288b5e0171d1d8fd3328e806d0794",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/smb/server/smb2pdu.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.160",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.120",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.64",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.18.*",
              "status": "unaffected",
              "version": "6.18.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.19",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.160",
                  "versionStartIncluding": "6.1.52",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.120",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.64",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.3",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.19",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.15.131",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.4.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.5.2",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix buffer validation by including null terminator size in EA length\n\nThe smb2_set_ea function, which handles Extended Attributes (EA),\nwas performing buffer validation checks that incorrectly omitted the size\nof the null terminating character (+1 byte) for EA Name.\nThis patch fixes the issue by explicitly adding \u0027+ 1\u0027 to EaNameLength where\nthe null terminator is expected to be present in the buffer, ensuring\nthe validation accurately reflects the total required buffer size."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T08:33:55.158Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/cae52c592a07e1d3fa3338a5f064a374a5f26750"
        },
        {
          "url": "https://git.kernel.org/stable/c/a28a375a5439eb474e9f284509a407efb479c925"
        },
        {
          "url": "https://git.kernel.org/stable/c/d26af6d14da43ab92d07bc60437c62901dc522e6"
        },
        {
          "url": "https://git.kernel.org/stable/c/6dc8cf6e7998ef7aeb9383a4c2904ea5d22fa2e4"
        },
        {
          "url": "https://git.kernel.org/stable/c/95d7a890e4b03e198836d49d699408fd1867cb55"
        }
      ],
      "title": "ksmbd: fix buffer validation by including null terminator size in EA length",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-68806",
    "datePublished": "2026-01-13T15:29:13.797Z",
    "dateReserved": "2025-12-24T10:30:51.045Z",
    "dateUpdated": "2026-02-09T08:33:55.158Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…