CVE-2025-39975Improper Validation of Specified Index, Position, or Offset in Input in Linux

Severity
5.8MEDIUM
No vector
EPSS
0.0%
top 92.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 15

Description

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op(), the loop that processes each command's response uses wrong indices when accessing response bufferes. This incorrect indexing leads to improper handling of command results. Also, if incorrectly computed index is greather than or equal to MAX_COMPOUND, it can cause out-of-bounds accesses.

Affected Packages4 packages

Linuxlinux/linux_kernel6.7.06.12.50+2
Debianlinux/linux_kernel< 6.12.57-1+1
CVEListV5linux/linux5ddcc9e92d54548219985ce4de88618fb53e14ecba7bcfd52c66dd1c2dfa5142aca7e4a70b62dfa5+5
debiandebian/linux< linux 6.16.10-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-cm9p-f4x4-35gj: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op2025-10-15
OSV
smb: client: fix wrong index reference in smb2_compound_op()2025-10-15
OSV
CVE-2025-39975: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix wrong index reference in smb2_compound_op() In smb2_compound_op()2025-10-15

📋Vendor Advisories

2
Red Hat
kernel: smb: client: fix wrong index reference in smb2_compound_op()2025-10-15
Debian
CVE-2025-39975: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...2025