CVE-2025-40084

high

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

References

https://git.kernel.org/stable/c/a02e432d5130da4c723aabe1205bac805889fdb2

https://git.kernel.org/stable/c/898d527ed94c19980a4d848f10057f1fed578ffb

https://git.kernel.org/stable/c/867ffd9d67285612da3f0498ca618297f8e41f01

https://git.kernel.org/stable/c/6f40e50ceb99fc8ef37e5c56e2ec1d162733fef0

https://git.kernel.org/stable/c/2dc125f5da134c0915a840b62565c60a595673dd

Details

Source: Mitre, NVD

Published: 2025-10-29

Updated: 2025-11-03

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018