| Name | CVE-2025-37947 |
| Description | In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds stream writes by validating *pos ksmbd_vfs_stream_write() did not validate whether the write offset (*pos) was within the bounds of the existing stream data length (v_len). If *pos was greater than or equal to v_len, this could lead to an out-of-bounds memory write. This patch adds a check to ensure *pos is less than v_len before proceeding. If the condition fails, -EINVAL is returned. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-4271-1, DSA-5925-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| linux (PTS) | bullseye | 5.10.223-1 | fixed |
| bullseye (security) | 5.10.244-1 | fixed | |
| bookworm | 6.1.148-1 | fixed | |
| bookworm (security) | 6.1.158-1 | fixed | |
| trixie | 6.12.57-1 | fixed | |
| trixie (security) | 6.12.48-1 | fixed | |
| forky | 6.16.12-2 | fixed | |
| sid | 6.17.8-1 | fixed | |
| linux-6.1 (PTS) | bullseye (security) | 6.1.153-1~deb11u1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| linux | source | bullseye | (not affected) | |||
| linux | source | bookworm | 6.1.140-1 | DSA-5925-1 | ||
| linux | source | (unstable) | 6.12.29-1 | |||
| linux-6.1 | source | bullseye | 6.1.140-1~deb11u1 | DLA-4271-1 |
[bullseye] - linux <not-affected> (Vulnerable code not present)
https://git.kernel.org/linus/0ca6df4f40cf4c32487944aaf48319cb6c25accc (6.15-rc6)
https://blog.doyensec.com/2025/10/08/ksmbd-3.html
https://github.com/doyensec/KSMBD-CVE-2025-37947/blob/main/CVE-2025-37947.c