First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acregmax mount option User-provided mount parameter acregmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.12<5.15.180 | |
Linux Kernel | >=5.16<6.1.132 | |
Linux Kernel | >=6.2<6.6.84 | |
Linux Kernel | >=6.7<6.12.20 | |
Linux Kernel | >=6.13<6.13.8 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 | |
Linux Kernel | =6.14-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21964 is classified as a vulnerability affecting the Linux kernel with a potential risk of integer overflow.
To fix CVE-2025-21964, ensure that you update your Linux kernel to the latest version where this vulnerability has been resolved.
CVE-2025-21964 affects the Linux kernel specifically related to the processing of the acregmax mount option.
The impact of CVE-2025-21964 includes potential exploitation through an integer overflow during the processing of user-provided mount parameters.
CVE-2025-21964 is primarily a local vulnerability since it requires local access to exploit the integer overflow within the mount parameters.