CVE-2025-21963
cifs: Fix integer overflow while processing acdirmax mount option
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix integer overflow while processing acdirmax mount option User-provided mount parameter acdirmax of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 1, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new medium vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4c9f948142a550af416a2bfb5e56d29ce29e92cf < 0c26edf477e093cefc41637f5bccc102e1a77399 4c9f948142a550af416a2bfb5e56d29ce29e92cf < 39d086bb3558da9640ef335f97453e01d32578a1 4c9f948142a550af416a2bfb5e56d29ce29e92cf < 9e438d0410a4002d24f420f2c28897ba2dc0af64 4c9f948142a550af416a2bfb5e56d29ce29e92cf < 2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c 4c9f948142a550af416a2bfb5e56d29ce29e92cf < 6124cbf73e3dea7591857dd63b8ccece28952afd 4c9f948142a550af416a2bfb5e56d29ce29e92cf < 5b29891f91dfb8758baf1e2217bef4b16b2b165b
Linux / Linux
5.12
References
git.kernel.org: https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399 git.kernel.org: https://git.kernel.org/stable/c/39d086bb3558da9640ef335f97453e01d32578a1 git.kernel.org: https://git.kernel.org/stable/c/9e438d0410a4002d24f420f2c28897ba2dc0af64 git.kernel.org: https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c git.kernel.org: https://git.kernel.org/stable/c/6124cbf73e3dea7591857dd63b8ccece28952afd git.kernel.org: https://git.kernel.org/stable/c/5b29891f91dfb8758baf1e2217bef4b16b2b165b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html