First published: Wed Apr 02 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix incorrect validation for num_aces field of smb_acl parse_dcal() validate num_aces to allocate posix_ace_state_array. if (num_aces > ULONG_MAX / sizeof(struct smb_ace *)) It is an incorrect validation that we can create an array of size ULONG_MAX. smb_acl has ->size field to calculate actual number of aces in request buffer size. Use this to check invalid num_aces.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21994 is classified as a high-severity vulnerability affecting the Linux kernel.
To address CVE-2025-21994, update your Linux kernel to the latest available version that contains the fix.
Exploiting CVE-2025-21994 could lead to unauthorized access or modification of ACLs within the kernel.
CVE-2025-21994 affects various versions of the Linux kernel up to the fixed release.
Yes, CVE-2025-21994 involves a fix related to incorrect validation within the SMB ACL handling of the Linux kernel.