First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.12<5.15.180 | |
Linux Kernel | >=5.16<6.1.132 | |
Linux Kernel | >=6.2<6.6.84 | |
Linux Kernel | >=6.7<6.12.20 | |
Linux Kernel | >=6.13<6.13.8 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 | |
Linux Kernel | =6.14-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21963 has been assigned a high severity due to its potential for exploitation in the Linux kernel.
To fix CVE-2025-21963, ensure you update your Linux kernel to the latest patched version that addresses this vulnerability.
CVE-2025-21963 affects multiple versions of the Linux kernel which process the acdirmax mount option without proper validation.
Exploitation of CVE-2025-21963 could lead to unintended behaviors or crashes due to the integer overflow in the acdirmax mount option.
CVE-2025-21963 was disclosed as part of ongoing security improvements in the Linux kernel to prevent integer overflow vulnerabilities.