CVE-2025-37947

high

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds stream writes by validating *pos ksmbd_vfs_stream_write() did not validate whether the write offset (*pos) was within the bounds of the existing stream data length (v_len). If *pos was greater than or equal to v_len, this could lead to an out-of-bounds memory write. This patch adds a check to ensure *pos is less than v_len before proceeding. If the condition fails, -EINVAL is returned.

References

https://git.kernel.org/stable/c/e6356499fd216ed6343ae0363f4c9303f02c5034

https://git.kernel.org/stable/c/d62ba16563a86aae052f96d270b3b6f78fca154c

https://git.kernel.org/stable/c/7f61da79df86fd140c7768e668ad846bfa7ec8e1

https://git.kernel.org/stable/c/0ca6df4f40cf4c32487944aaf48319cb6c25accc

https://git.kernel.org/stable/c/04c8a38c60346bb5a7c49b276de7233f703ce9cb

Details

Source: Mitre, NVD

Published: 2025-05-20

Updated: 2025-05-21

Risk Information

CVSS v2

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018