First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix overflow in dacloffset bounds check The dacloffset field was originally typed as int and used in an unchecked addition, which could overflow and bypass the existing bounds check in both smb_check_perm_dacl() and smb_inherit_dacl(). This could result in out-of-bounds memory access and a kernel crash when dereferencing the DACL pointer. This patch converts dacloffset to unsigned int and uses check_add_overflow() to validate access to the DACL.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-22039 is considered moderate due to potential overflow issues.
To fix CVE-2025-22039, users should update their Linux kernel to the latest patched version.
CVE-2025-22039 affects several versions of the Linux kernel that utilize the ksmbd module.
CVE-2025-22039 could allow an attacker to exploit an overflow to bypass permission checks.
Yes, CVE-2025-22039 has been publicly disclosed and documented.