VYPR
Unrated severityNVD Advisory· Published Oct 15, 2025· Updated Apr 15, 2026

CVE-2025-39975

CVE-2025-39975

Description

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix wrong index reference in smb2_compound_op()

In smb2_compound_op(), the loop that processes each command's response uses wrong indices when accessing response bufferes.

This incorrect indexing leads to improper handling of command results. Also, if incorrectly computed index is greather than or equal to MAX_COMPOUND, it can cause out-of-bounds accesses.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's SMB client, an incorrect index reference in smb2_compound_op() causes wrong command response handling and potential out-of-bounds access.

Root

Cause

In the Linux kernel's CIFS/SMB2 client subsystem, the function smb2_compound_op() contains a bug where the loop that processes each command's response uses incorrect indices when accessing response buffers. This leads to improper handling of command results. The issue is described in the CVE description and the referenced kernel stable commits [1][2].

Attack

Vector

An attacker who can trigger compound SMB2 operations on a system running an affected kernel version may exploit this indexing flaw. If the incorrectly computed index is greater than or equal to MAX_COMPOUND, it can cause out-of-bounds memory accesses. The vulnerability resides in the client-side processing of server responses, so a malicious SMB server or a man-in-the-middle capable of influencing SMB responses could potentially trigger the bug. No authentication is required beyond the ability to initiate SMB compound requests.

Impact

Successful exploitation could lead to memory corruption, system crash (denial of service), or potentially privilege escalation depending on how the out-of-bounds access is leveraged. The improper command result handling may also cause data integrity issues or incorrect file system operations.

Mitigation

The fix is included in the Linux kernel stable tree via commits [1] and [2]. Users should apply the latest kernel updates from their distribution. Affected versions include those prior to the patched commits; the vulnerability was discovered and resolved as part of ongoing kernel maintenance.

References

[1] Kernel stable commit: bfb1e2aad1fecef8320fd71332acde0d53a8d699 [2] Kernel stable commit: 093615fc76063ea08d454ba86677ce64c736e806

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

4

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.