{"id":"CVE-2025-21963","summary":"cifs: Fix integer overflow while processing acdirmax mount option","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acdirmax mount option\n\nUser-provided mount parameter acdirmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.","modified":"2026-03-20T12:41:15.708131Z","published":"2025-04-01T15:46:59.773Z","related":["ALSA-2025:9080","MGASA-2025-0142","MGASA-2025-0146","SUSE-SU-2025:01600-1","SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:01972-1","SUSE-SU-2025:20343-1","SUSE-SU-2025:20344-1","SUSE-SU-2025:20354-1","SUSE-SU-2025:20355-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21963.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/39d086bb3558da9640ef335f97453e01d32578a1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5b29891f91dfb8758baf1e2217bef4b16b2b165b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6124cbf73e3dea7591857dd63b8ccece28952afd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e438d0410a4002d24f420f2c28897ba2dc0af64"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21963.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21963"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4c9f948142a550af416a2bfb5e56d29ce29e92cf"},{"fixed":"0c26edf477e093cefc41637f5bccc102e1a77399"},{"fixed":"39d086bb3558da9640ef335f97453e01d32578a1"},{"fixed":"9e438d0410a4002d24f420f2c28897ba2dc0af64"},{"fixed":"2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c"},{"fixed":"6124cbf73e3dea7591857dd63b8ccece28952afd"},{"fixed":"5b29891f91dfb8758baf1e2217bef4b16b2b165b"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21963.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}