CVE-2025-21748
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
27/02/2025
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ksmbd: fix integer overflows on 32 bit systems<br />
<br />
On 32bit systems the addition operations in ipc_msg_alloc() can<br />
potentially overflow leading to memory corruption.<br />
Add bounds checking using KSMBD_IPC_MAX_PAYLOAD to avoid overflow.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15 (including) | 6.1.129 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.78 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.14 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/760568c1f62ea874e8fb492f9cfa4f47b4b8391e
- https://git.kernel.org/stable/c/82f59d64e6297f270311b16b5dcf65be406d1ea3
- https://git.kernel.org/stable/c/aab98e2dbd648510f8f51b83fbf4721206ccae45
- https://git.kernel.org/stable/c/b4b902737746c490258de5cb55cab39e79927a67
- https://git.kernel.org/stable/c/ecb9947fa7c99a77b04d43404c6988a0d326e4a0
- https://git.kernel.org/stable/c/f3b9fb2764591d792d160f375851013665a9e820