CVE-2025-68786
Description
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: skip lock-range check on equal size to avoid size==0 underflow
When size equals the current i_size (including 0), the code used to call check_lock_range(filp, i_size, size - 1, WRITE), which computes size - 1 and can underflow for size==0. Skip the equal case.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's ksmbd, a lock-range check with size equal to i_size can cause an integer underflow, leading to a denial of service.
Root
Cause
The vulnerability resides in the Linux kernel's ksmbd server, specifically in the code that handles lock-range requests. When the requested size equals the current i_size (which can be 0), the function check_lock_range is called with arguments (filp, i_size, size - 1, WRITE). If size is 0, computing size - 1 results in an integer underflow, producing a large positive value instead of -1.[1][2]
Attack
Vector
An attacker can exploit this by issuing a crafted SMB lock request where the lock range size matches the file's i_size, including the case where i_size is 0 (e.g., an empty file). The underflow leads to unexpected behavior in the lock-range validation logic, potentially causing a system crash or hang.
Impact
Successful exploitation can cause denial of service (DoS) on the ksmbd server, disrupting file sharing services for legitimate users. The vulnerability can be triggered remotely without authentication, as SMB lock requests are typically handled during file access.
Mitigation
The fix introduces a check to skip the check_lock_range call when the size equals i_size, preventing the underflow. The patch has been applied to the Linux stable kernel trees. Users should update to the patched kernel version.[1][2]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/52fcbb92e0d3acfd1448b2a43b6595d540da5295nvd
- git.kernel.org/stable/c/571204e4758a528fbd67330bd4b0dfbdafb33dd8nvd
- git.kernel.org/stable/c/5d510ac31626ed157d2182149559430350cf2104nvd
- git.kernel.org/stable/c/a6f4cfa3783804336491e0edcb250c25f9b59d33nvd
- git.kernel.org/stable/c/da29cd197246c85c0473259f1cad897d9d28faeanvd
News mentions
0No linked articles in our index yet.