Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read. This patch adds a validation step to ensure num_subauth != 0 before sub_auth is accessed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.1.134 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/0e36a3e080d6d8bd7a34e089345d043da4ac8283Patch
- https://git.kernel.org/stable/c/3ac65de111c686c95316ade660f8ba7aea3cd3ccPatch
- https://git.kernel.org/stable/c/56de7778a48560278c334077ace7b9ac4bfb2fd1Patch
- https://git.kernel.org/stable/c/68c6c3142bfcdb049839d40a9a59ebe8ea865002Patch
- https://git.kernel.org/stable/c/bf21e29d78cd2c2371023953d9c82dfef82ebb36Patch
- https://git.kernel.org/stable/c/c8bfe1954a0b89e7b29b3a3e7f4c5e0ebd295e20Patch
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
FAQ
What is CVE-2025-22038?
CVE-2025-22038 is a vulnerability with a CVSS score of 7.1 (HIGH). In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_...
How severe is CVE-2025-22038?
CVE-2025-22038 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-22038?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.