Impact
The Linux kernel ksmbd service contains a flaw where response message sizes are computed without proper bounds checking, leading to unsigned integer overflow. This allows an attacker to craft SMB responses that cause the kernel to accept an invalid, wrapped size value. When the overflowed size matches the expected size, subsequent memory operations such as memcpy and kmemdup are performed with the unverified length, creating a kernel memory corruption vulnerability.
Affected Systems
All Linux kernel builds that include the ksmbd SMB server subsystem without the listed patch are affected. No specific kernel versions are enumerated in the CVE data, so any pre‑patch kernel running ksmbd may be vulnerable.
Risk and Exploitability
The CVE does not provide a CVSS score or EPSS value, and it is not listed in the CISA KEV catalog. Based on the description, it is inferred that the exploit requires an attacker to send malicious SMB response messages over the network, implying a remote attack vector. The integer overflow can lead to uncontrolled memory reads or writes within the kernel, which could allow privilege escalation or denial of service if successfully triggered. The lack of an EPSS score suggests no data on current exploitation prevalence, but the severity of the overflow warrants attention.
OpenCVE Enrichment