Description
In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small (16 vs u32max) It's caused because Smatch marks 'link_len' as untrusted since it comes from sscanf(). Add a check to ensure that 'link_len' is not larger than the size of the 'link_str' buffer.
References (8)
Core 8
Core References
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (9)
linux/Kernel
2.6.37 - 4.9.311linux
linux/Kernel
4.10.0 - 4.14.276linux
linux/Kernel
4.15.0 - 4.19.239linux
linux/Kernel
4.20.0 - 5.4.190linux
linux/Kernel
5.11.0 - 5.15.35linux
linux/Kernel
5.16.0 - 5.17.4linux
linux/Kernel
5.5.0 - 5.10.112linux
linux/linux_kernel
5.18 rc1 (2 CPE variants)
linux/linux_kernel
2.6.37 - 4.9.311
Published
Feb 26, 2025
Tracked Since
Feb 18, 2026