In the Linux kernel, the following vulnerability has been resolved:
ksmbd: avoid out of bounds access in decodepreauthctxt()
Confirm that the accessed pnegctxt->HashAlgorithms address sits within the SMB request boundary; deassemblenegcontexts() only checks that the eight byte smb2neg_context header + (client controlled) DataLength are within the packet boundary, which is insufficient.
Checking for sizeof(struct smb2preauthnegcontext) is overkill given that the type currently assumes SMB311SALT_SIZE bytes of trailing Salt.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54250.json",
"cna_assigner": "Linux"
}