First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.15.107<5.15.180 | |
Linux Kernel | >=6.0<6.1.132 | |
Linux Kernel | >=6.2<6.6.84 | |
Linux Kernel | >=6.7<6.12.20 | |
Linux Kernel | >=6.13<6.13.8 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 | |
Linux Kernel | =6.14-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21962 has been classified with a moderate severity level due to the potential for integer overflow exploiting the closetimeo mount option.
To fix CVE-2025-21962, update your Linux kernel to the latest version that includes the patch for the integer overflow vulnerability.
CVE-2025-21962 affects multiple versions of the Linux Kernel that have not implemented the fix for the closetimeo mount option vulnerability.
Exploiting CVE-2025-21962 could lead to system instability or unauthorized access depending on the context in which the vulnerability is exploited.
The responsibility for patching CVE-2025-21962 lies with system administrators and users of affected Linux Kernel versions.