CVE-2025-57632
libsmb2 6.2+ is vulnerable to Buffer Overflow. When processing SMB2 chained PDUs (NextCommand), libsmb2 repeatedly calls smb2addiovector() to append to a fixed-size iovec array without checking the upper bound of v->niov (SMB2MAXVECTORS=256). An attacker can craft responses with many chained PDUs to overflow v->niov and perform heap out-of-bounds writes, causing memory corruption, crashes, and potentially arbitrary code execution. The SMB2OPLOCKBREAK path bypasses message ID validation.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://gist.github.com/ZjW1nd/0b95b63307ceee7890e88e4abc6f041e, https://github.com/sahlberg/libsmb2/blob/master/lib/compat.c#L569, https://github.com/sahlberg/libsmb2/commit/5e75eebf922b338cdb548d60cffb3b997d2a12e8, https://github.com/sahlberg/libsmb2
