CVE-2025-40099

Source
https://cve.org/CVERecord?id=CVE-2025-40099
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40099.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40099
Downstream
Related
Published
2025-10-30T09:48:05.859Z
Modified
2026-03-12T03:54:32.520993Z
Summary
cifs: parse_dfs_referrals: prevent oob on malformed input
Details

In the Linux kernel, the following vulnerability has been resolved:

cifs: parsedfsreferrals: prevent oob on malformed input

Malicious SMB server can send invalid reply to FSCTLDFSGET_REFERRALS

  • reply smaller than sizeof(struct getdfsreferral_rsp)
  • reply with number of referrals smaller than NumberOfReferrals in the header

Processing of such replies will cause oob.

Return -EINVAL error on such replies to prevent oob-s.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40099.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4ecce920e13ace16a5ba45efe8909946c28fb2ad
Fixed
cfacc7441f760e4a73cc71b6ff1635261d534657
Fixed
15c73964da9df994302f579ed14ee5fdbce7a332
Fixed
8bc4a8d39bac23d8b044fd3e2dbfd965f1d9b058
Fixed
bb0f2e66e1ac043a5b238f5bcab4f26f3c317039
Fixed
6447b0e355562a1ff748c4a2ffb89aae7e84d2c9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40099.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.11.0
Fixed
6.1.158
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.114
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.55
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40099.json"