In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix incorrect validation for num_aces field of smb_acl
parse_dcal() validate num_aces to allocate posix_ace_state_array.
if (num_aces > ULONG_MAX / sizeof(struct smb_ace *))
It is an incorrect validation that we can create an array of size ULONG_MAX.
smb_acl has ->size field to calculate actual number of aces in request buffer
size. Use this to check invalid num_aces.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Apr 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-99 |
Thu, 10 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 02 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: ksmbd: fix incorrect validation for num_aces field of smb_acl | ksmbd: fix incorrect validation for num_aces field of smb_acl |
Fri, 04 Apr 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | kernel: ksmbd: fix incorrect validation for num_aces field of smb_acl | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 02 Apr 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix incorrect validation for num_aces field of smb_acl parse_dcal() validate num_aces to allocate posix_ace_state_array. if (num_aces > ULONG_MAX / sizeof(struct smb_ace *)) It is an incorrect validation that we can create an array of size ULONG_MAX. smb_acl has ->size field to calculate actual number of aces in request buffer size. Use this to check invalid num_aces. | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-04-02T14:00:37.407Z
Updated: 2025-05-04T07:27:00.353Z
Reserved: 2024-12-29T08:45:45.801Z
Link: CVE-2025-21994

No data.

Status : Awaiting Analysis
Published: 2025-04-02T14:16:01.440
Modified: 2025-04-10T13:15:49.333
Link: CVE-2025-21994
