[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025041659-CVE-2025-22038-1b5a@gregkh>
Date: Wed, 16 Apr 2025 16:12:09 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2025-22038: ksmbd: validate zero num_subauth before sub_auth is accessed
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: validate zero num_subauth before sub_auth is accessed
Access psid->sub_auth[psid->num_subauth - 1] without checking
if num_subauth is non-zero leads to an out-of-bounds read.
This patch adds a validation step to ensure num_subauth != 0
before sub_auth is accessed.
The Linux kernel CVE team has assigned CVE-2025-22038 to this issue.
Affected and fixed versions
===========================
Fixed in 6.1.134 with commit 3ac65de111c686c95316ade660f8ba7aea3cd3cc
Fixed in 6.6.87 with commit 0e36a3e080d6d8bd7a34e089345d043da4ac8283
Fixed in 6.12.23 with commit 56de7778a48560278c334077ace7b9ac4bfb2fd1
Fixed in 6.13.11 with commit 68c6c3142bfcdb049839d40a9a59ebe8ea865002
Fixed in 6.14.2 with commit c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20
Fixed in 6.15-rc1 with commit bf21e29d78cd2c2371023953d9c82dfef82ebb36
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-22038
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
fs/smb/server/smbacl.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3cc
https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283
https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1
https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002
https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20
https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36
Powered by blists - more mailing lists