Bug 2407085 (CVE-2025-40084) - CVE-2025-40084 kernel: ksmbd: transport_ipc: validate payload size before reading handle
Summary: CVE-2025-40084 kernel: ksmbd: transport_ipc: validate payload size before rea...
Keywords:
Status: NEW
Alias: CVE-2025-40084
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-29 14:03 UTC by OSIDB Bzimport
Modified: 2025-11-26 13:25 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-29 14:03:05 UTC
In the Linux kernel, the following vulnerability has been resolved:

ksmbd: transport_ipc: validate payload size before reading handle

handle_response() dereferences the payload as a 4-byte handle without
verifying that the declared payload size is at least 4 bytes. A malformed
or truncated message from ksmbd.mountd can lead to a 4-byte read past the
declared payload size. Validate the size before dereferencing.

This is a minimal fix to guard the initial handle read.


Note You need to log in before you can comment on or make changes to this bug.