In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix integer overflow while processing closetimeo mount option
User-provided mount parameter closetimeo of type u32 is intended to have an upper limit, but before it is validated, the value is converted from seconds to jiffies which can lead to an integer overflow.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[
{
"id": "CVE-2025-21962-1113ce62",
"target": {
"file": "fs/cifs/fs_context.c",
"function": "smb3_fs_context_parse_param"
},
"digest": {
"function_hash": "297698811623691788252284912773384614708",
"length": 14269.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@513f6cf2e906a504b7ab0b62b2eea993a6f64558",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-196bbca5",
"target": {
"file": "fs/cifs/fs_context.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"326984463214304396992360141125319833799",
"184645887009639510525629588775558788046",
"252648847360166670368923534582657150270",
"135339021731778423918916141953052613483",
"190992515780468660581073260410479036671",
"106634790995351466119976521529158072180",
"244703113155079620640498294774892916249",
"59719016896021714684292115624552885054"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@513f6cf2e906a504b7ab0b62b2eea993a6f64558",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-4d753c01",
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_fs_context_parse_param"
},
"digest": {
"function_hash": "145042941802545537979268853947531883194",
"length": 15602.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1c46673be93dd2954f44fe370fb4f2b8e6214224",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-58cc9bc7",
"target": {
"file": "fs/smb/client/fs_context.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"326984463214304396992360141125319833799",
"184645887009639510525629588775558788046",
"252648847360166670368923534582657150270",
"135339021731778423918916141953052613483",
"190992515780468660581073260410479036671",
"106634790995351466119976521529158072180",
"244703113155079620640498294774892916249",
"59719016896021714684292115624552885054"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9968fcf02cf6b0f78fbacf3f63e782162603855a",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-61c43516",
"target": {
"file": "fs/smb/client/fs_context.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"326984463214304396992360141125319833799",
"184645887009639510525629588775558788046",
"252648847360166670368923534582657150270",
"135339021731778423918916141953052613483",
"190992515780468660581073260410479036671",
"106634790995351466119976521529158072180",
"244703113155079620640498294774892916249",
"59719016896021714684292115624552885054"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1c46673be93dd2954f44fe370fb4f2b8e6214224",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-6e004dea",
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_fs_context_parse_param"
},
"digest": {
"function_hash": "112166921788118759593990193111265234998",
"length": 16503.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5a30fddfe2f2e540f6c43b59cf701809995faef",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-87ba8457",
"target": {
"file": "fs/smb/client/fs_context.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"326984463214304396992360141125319833799",
"184645887009639510525629588775558788046",
"252648847360166670368923534582657150270",
"135339021731778423918916141953052613483",
"190992515780468660581073260410479036671",
"106634790995351466119976521529158072180",
"244703113155079620640498294774892916249",
"59719016896021714684292115624552885054"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5a30fddfe2f2e540f6c43b59cf701809995faef",
"signature_version": "v1"
},
{
"id": "CVE-2025-21962-ed152c03",
"target": {
"file": "fs/smb/client/fs_context.c",
"function": "smb3_fs_context_parse_param"
},
"digest": {
"function_hash": "285831762147659660553007456097074508870",
"length": 14506.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9968fcf02cf6b0f78fbacf3f63e782162603855a",
"signature_version": "v1"
}
]