CVE-2025-40084

high

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Validate the size before dereferencing. This is a minimal fix to guard the initial handle read.

References

https://git.kernel.org/stable/c/a02e432d5130da4c723aabe1205bac805889fdb2

https://git.kernel.org/stable/c/898d527ed94c19980a4d848f10057f1fed578ffb

https://git.kernel.org/stable/c/867ffd9d67285612da3f0498ca618297f8e41f01

https://git.kernel.org/stable/c/2dc125f5da134c0915a840b62565c60a595673dd

Details

Source: Mitre, NVD

Published: 2025-10-29

Updated: 2025-10-30

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High

EPSS

EPSS: 0.00018