CVE-2025-57632
Publication date 25 September 2025
Last updated 1 October 2025
Ubuntu priority
Cvss 3 Severity Score
Description
libsmb2 6.2+ is vulnerable to Buffer Overflow. When processing SMB2 chained PDUs (NextCommand), libsmb2 repeatedly calls smb2_add_iovector() to append to a fixed-size iovec array without checking the upper bound of v->niov (SMB2_MAX_VECTORS=256). An attacker can craft responses with many chained PDUs to overflow v->niov and perform heap out-of-bounds writes, causing memory corruption, crashes, and potentially arbitrary code execution. The SMB2_OPLOCK_BREAK path bypasses message ID validation.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| libsmb2 | 25.10 questing | 
                                Needs evaluation 
                                
                               | 
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | 
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score |  | 
| Attack vector | Network | 
| Attack complexity | Low | 
| Privileges required | None | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | None | 
| Integrity impact | None | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |