VYPR
Unrated severityNVD Advisory· Published Jan 13, 2026· Updated Apr 15, 2026

CVE-2025-68806

CVE-2025-68806

Description

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix buffer validation by including null terminator size in EA length

The smb2_set_ea function, which handles Extended Attributes (EA), was performing buffer validation checks that incorrectly omitted the size of the null terminating character (+1 byte) for EA Name. This patch fixes the issue by explicitly adding '+ 1' to EaNameLength where the null terminator is expected to be present in the buffer, ensuring the validation accurately reflects the total required buffer size.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An off-by-one buffer validation error in Linux kernel's ksmbd SMB2 EA handler can lead to memory corruption via crafted requests.

The Linux kernel's ksmbd subsystem contains an off-by-one vulnerability in the smb2_set_ea function, which processes Extended Attributes (EA) for SMB2 protocol requests. The function's buffer validation incorrectly omitted the size of the null terminator for the EA name, leading to a mismatch between the expected and actual buffer size [1][2].

An attacker with the ability to send SMB2 requests to a system running ksmbd can exploit this by crafting a request with an EA name that exploits the off-by-one error. The vulnerability does not require authentication beyond standard SMB access, as EA operations are part of normal file operations.

If successfully exploited, the off-by-one error can cause a buffer overflow, potentially leading to memory corruption, system crash, or arbitrary code execution in kernel context, which could compromise the entire system.

The fix, which adds '+1' to the length check to account for the null terminator, has been backported to stable kernel trees [1][2]. Users are advised to apply the latest kernel updates to mitigate this vulnerability.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.