CVE-2025-21994
02.04.2025, 14:16
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix incorrect validation for num_aces field of smb_acl parse_dcal() validate num_aces to allocate posix_ace_state_array. if (num_aces > ULONG_MAX / sizeof(struct smb_ace *)) It is an incorrect validation that we can create an array of size ULONG_MAX. smb_acl has ->size field to calculate actual number of aces in request buffer size. Use this to check invalid num_aces.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 5.15 ≤ 𝑥 < 5.15.180 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.132 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.85 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.21 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.13.9 |
| linux | linux_kernel | 6.14:rc1 |
| linux | linux_kernel | 6.14:rc2 |
| linux | linux_kernel | 6.14:rc3 |
| linux | linux_kernel | 6.14:rc4 |
| linux | linux_kernel | 6.14:rc5 |
𝑥
= Vulnerable software versions
Debian Releases
References