CVE-2025-68786Linux vulnerability

14 documents7 sources
Severity
6.4MEDIUM
No vector
EPSS
0.0%
top 88.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateApr 17

Description

In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip lock-range check on equal size to avoid size==0 underflow When size equals the current i_size (including 0), the code used to call check_lock_range(filp, i_size, size - 1, WRITE), which computes `size - 1` and can underflow for size==0. Skip the equal case.

Affected Packages15 packages

Linuxlinux/linux_kernel5.15.06.1.160+3
Debianlinux/linux_kernel< 6.1.162-1+2
CVEListV5linux/linuxf44158485826c076335d6860d35872271a83791d52fcbb92e0d3acfd1448b2a43b6595d540da5295+5
debiandebian/linux< linux 6.1.162-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.162-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2025-68786: In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip lock-range check on equal size to avoid size==0 underflow When size eq2026-01-13
OSV
ksmbd: skip lock-range check on equal size to avoid size==0 underflow2026-01-13
GHSA
GHSA-7vqw-4gww-392j: In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip lock-range check on equal size to avoid size==0 underflow When size2026-01-13

📋Vendor Advisories

9
Ubuntu
Linux kernel (GCP) vulnerabilities2026-04-17
Ubuntu
Linux kernel (FIPS) vulnerabilities2026-04-17
Ubuntu
Linux kernel (Real-time) vulnerabilities2026-04-17
Ubuntu
Linux kernel (Real-time) vulnerabilities2026-04-17
Ubuntu
Linux kernel (NVIDIA) vulnerabilities2026-04-17

🕵️Threat Intelligence

1
Wiz
CVE-2025-68786 Impact, Exploitability, and Mitigation Steps | Wiz