CVE-2025-21962
cifs: Fix integer overflow while processing closetimeo mount option
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing closetimeo mount option User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 1, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1d9cad9c5873097ea141ffc5da1e7921ce765aa8 < 513f6cf2e906a504b7ab0b62b2eea993a6f64558 5efdd9122eff772eae2feae9f0fc0ec02d4846a3 < 9968fcf02cf6b0f78fbacf3f63e782162603855a 5efdd9122eff772eae2feae9f0fc0ec02d4846a3 < 6c13fcb7cf59ae65940da1dfea80144e42921e53 5efdd9122eff772eae2feae9f0fc0ec02d4846a3 < 1c46673be93dd2954f44fe370fb4f2b8e6214224 5efdd9122eff772eae2feae9f0fc0ec02d4846a3 < b24edd5c191c2689c59d0509f0903f9487eb6317 5efdd9122eff772eae2feae9f0fc0ec02d4846a3 < d5a30fddfe2f2e540f6c43b59cf701809995faef
Linux / Linux
6.0
References
git.kernel.org: https://git.kernel.org/stable/c/513f6cf2e906a504b7ab0b62b2eea993a6f64558 git.kernel.org: https://git.kernel.org/stable/c/9968fcf02cf6b0f78fbacf3f63e782162603855a git.kernel.org: https://git.kernel.org/stable/c/6c13fcb7cf59ae65940da1dfea80144e42921e53 git.kernel.org: https://git.kernel.org/stable/c/1c46673be93dd2954f44fe370fb4f2b8e6214224 git.kernel.org: https://git.kernel.org/stable/c/b24edd5c191c2689c59d0509f0903f9487eb6317 git.kernel.org: https://git.kernel.org/stable/c/d5a30fddfe2f2e540f6c43b59cf701809995faef lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html