In the Linux kernel, the following vulnerability has been resolved:
ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
If data_offset and data_length of smb_direct_data_transfer struct are
invalid, out of bounds issue could happen.
This patch validate data_offset and data_length field in recv_done.
References
Configurations
Configuration 1 (hide)
|
History
27 Jan 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| References | () https://git.kernel.org/stable/c/5282491fc49d5614ac6ddcd012e5743eecb6a67c - Patch | |
| References | () https://git.kernel.org/stable/c/529b121b00a6ee3c88fb3c01b443b2b81f686d48 - Patch | |
| References | () https://git.kernel.org/stable/c/773fddf976d282ef059c36c575ddb81567acd6bc - Patch | |
| References | () https://git.kernel.org/stable/c/8be498fcbd5b07272f560b45981d4b9e5a2ad885 - Patch | |
| References | () https://git.kernel.org/stable/c/bdaab5c6538e250a9654127e688ecbbeb6f771d5 - Patch | |
| References | () https://git.kernel.org/stable/c/eb0378dde086363046ed3d7db7f126fc3f76fd70 - Patch |
04 Oct 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 08:15
Updated : 2026-01-27 19:53
NVD link : CVE-2025-39943
Mitre link : CVE-2025-39943
CVE.ORG link : CVE-2025-39943
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
