In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate zero num_subauth before sub_auth is accessed
Access psid->sub_auth[psid->num_subauth - 1] without checking
if num_subauth is non-zero leads to an out-of-bounds read.
This patch adds a validation step to ensure num_subauth != 0
before sub_auth is accessed.
References
Configurations
Configuration 1 (hide)
|
History
29 Apr 2025, 19:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283 - Patch | |
References | () https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3cc - Patch | |
References | () https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1 - Patch | |
References | () https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002 - Patch | |
References | () https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36 - Patch | |
References | () https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-125 | |
Summary |
|
16 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 15:15
Updated : 2025-04-29 19:04
NVD link : CVE-2025-22038
Mitre link : CVE-2025-22038
CVE.ORG link : CVE-2025-22038
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read