PT-2025-22208 · Linux+5 · Linux Kernel+5

Published

2025-05-06

·

Updated

2026-03-25

·

CVE-2025-37947

CVSS v3.1

7.8

High

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Linux kernel versions prior to 6.6.93 Linux kernel versions prior to 6.1.140-1 (Debian 11 bullseye) Linux kernel versions prior to 6.1.140-1~deb11u1 (Debian 11 bullseye)
Description The Linux kernel contains a flaw in the ksmbd module related to out-of-bounds stream writes. Specifically, the ksmbd vfs stream write() function did not validate whether the write offset (*pos) was within the bounds of the existing stream data length (v len). If *pos was greater than or equal to v len, this could lead to an out-of-bounds memory write. A patch has been implemented to add a check to ensure *pos is less than v len before proceeding, returning -EINVAL if the condition fails. Exploitation of this vulnerability can lead to local privilege escalation. Proof-of-concept (PoC) exploits are publicly available.
Recommendations Upgrade to Linux kernel version 6.6.93 or later. Upgrade to Linux kernel version 6.1.140-1 or later for Debian 11 bullseye. Upgrade to Linux kernel version 6.1.140-1~deb11u1 or later for Debian 11 bullseye.

Exploit

Fix

LPE

Out of bounds Read

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2025-11865
CVE-2025-37947
DLA-4271-1
DSA-5925-1
ECHO-37AD-7420-A4ED
MGASA-2025-0182
MGASA-2025-0183
OESA-2026-1341
USN-7699-1
USN-7699-2
USN-7721-1
USN-8028-1
USN-8028-2
USN-8028-3
USN-8028-4
USN-8028-5
USN-8028-6
USN-8028-7
USN-8028-8
USN-8031-1
USN-8031-2
USN-8031-3
USN-8052-1
USN-8052-2
USN-8074-1
USN-8074-2
USN-8126-1

Affected Products

Astra Linux
Debian
Linuxmint
Linux Kernel
Red Os
Ubuntu