CVE-2025-21963

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*

History

14 Apr 2025, 12:41

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399 - () https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399 - Patch
References () https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c - () https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c - Patch
References () https://git.kernel.org/stable/c/39d086bb3558da9640ef335f97453e01d32578a1 - () https://git.kernel.org/stable/c/39d086bb3558da9640ef335f97453e01d32578a1 - Patch
References () https://git.kernel.org/stable/c/5b29891f91dfb8758baf1e2217bef4b16b2b165b - () https://git.kernel.org/stable/c/5b29891f91dfb8758baf1e2217bef4b16b2b165b - Patch
References () https://git.kernel.org/stable/c/6124cbf73e3dea7591857dd63b8ccece28952afd - () https://git.kernel.org/stable/c/6124cbf73e3dea7591857dd63b8ccece28952afd - Patch
References () https://git.kernel.org/stable/c/9e438d0410a4002d24f420f2c28897ba2dc0af64 - () https://git.kernel.org/stable/c/9e438d0410a4002d24f420f2c28897ba2dc0af64 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-190
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*

10 Apr 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige el desbordamiento de enteros al procesar la opción de montaje acdirmax. El parámetro de montaje acdirmax, proporcionado por el usuario y de tipo u32, está diseñado para tener un límite superior, pero antes de su validación, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificación de Linux (linuxtesting.org) con SVACE.
References
  • () https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399 -

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-14 12:41


NVD link : CVE-2025-21963

Mitre link : CVE-2025-21963

CVE.ORG link : CVE-2025-21963


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound