CVE-2025-22038

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read. This patch adds a validation step to ensure num_subauth != 0 before sub_auth is accessed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Apr 2025, 19:04

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283 - () https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283 - Patch
References () https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3cc - () https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3cc - Patch
References () https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1 - () https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1 - Patch
References () https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002 - () https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002 - Patch
References () https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36 - () https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36 - Patch
References () https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20 - () https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-125
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: validar num_subauth a cero antes de acceder a sub_auth. Acceder a psid->sub_auth[psid->num_subauth - 1] sin comprobar si num_subauth es distinto de cero provoca una lectura fuera de los límites. Este parche añade un paso de validación para garantizar que num_subauth sea != 0 antes de acceder a sub_auth.

16 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:15

Updated : 2025-04-29 19:04


NVD link : CVE-2025-22038

Mitre link : CVE-2025-22038

CVE.ORG link : CVE-2025-22038


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read