In the Linux kernel, the following vulnerability has been resolved:
net/smc: fix one NULL pointer dereference in smcibissgneed_sync()
BUG: kernel NULL pointer dereference, address: 00000000000002ec PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP PTI CPU: 28 UID: 0 PID: 343 Comm: kworker/28:1 Kdump: loaded Tainted: G OE 6.17.0-rc2+ #9 NONE Tainted: [O]=OOTMODULE, [E]=UNSIGNEDMODULE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 Workqueue: smchswq smclistenwork [smc] RIP: 0010:smcibissgneedsync+0x9e/0xd0 [smc] ... Call Trace: <TASK> smcrbufmaplink+0x211/0x2a0 [smc] _smcbufcreate+0x522/0x970 [smc] smcbufcreate+0x3a/0x110 [smc] smcfindrdmav2deviceserv+0x18f/0x240 [smc] ? smcvlanbytcpsk+0x7e/0xe0 [smc] smclistenfinddevice+0x1dd/0x2b0 [smc] smclistenwork+0x30f/0x580 [smc] processonework+0x18c/0x340 workerthread+0x242/0x360 kthread+0xe7/0x220 retfromfork+0x13a/0x160 retfromforkasm+0x1a/0x30 </TASK>
If the software RoCE device is used, ibdev->dma_device is a null pointer. As a result, the problem occurs. Null pointer detection is added to prevent problems.
[
{
"id": "CVE-2025-39857-04fd3d36",
"target": {
"function": "smc_ib_is_sg_need_sync",
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@34f17cbe027050b8d5316ea1b6f9bd7c378e92de",
"deprecated": false,
"digest": {
"length": 386.0,
"function_hash": "5348523478696691290241022243621899057"
}
},
{
"id": "CVE-2025-39857-0b817176",
"target": {
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cdf1fd8fc59d44a48c694324611136910301ef9",
"deprecated": false,
"digest": {
"line_hashes": [
"316761453972516977319956445519095319421",
"225546753762193028464088858133381791816",
"192009587245991263155177277482300609419"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-39857-398972af",
"target": {
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba1e9421cf1a8369d25c3832439702a015d6b5f9",
"deprecated": false,
"digest": {
"line_hashes": [
"316761453972516977319956445519095319421",
"225546753762193028464088858133381791816",
"192009587245991263155177277482300609419"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-39857-71421fea",
"target": {
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@34f17cbe027050b8d5316ea1b6f9bd7c378e92de",
"deprecated": false,
"digest": {
"line_hashes": [
"316761453972516977319956445519095319421",
"225546753762193028464088858133381791816",
"192009587245991263155177277482300609419"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-39857-738105fc",
"target": {
"function": "smc_ib_is_sg_need_sync",
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb929910bd4b4165920fa06a87b22cc6cae92e0e",
"deprecated": false,
"digest": {
"length": 386.0,
"function_hash": "5348523478696691290241022243621899057"
}
},
{
"id": "CVE-2025-39857-9a958141",
"target": {
"function": "smc_ib_is_sg_need_sync",
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ba1e9421cf1a8369d25c3832439702a015d6b5f9",
"deprecated": false,
"digest": {
"length": 386.0,
"function_hash": "5348523478696691290241022243621899057"
}
},
{
"id": "CVE-2025-39857-bf7e27a4",
"target": {
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb929910bd4b4165920fa06a87b22cc6cae92e0e",
"deprecated": false,
"digest": {
"line_hashes": [
"316761453972516977319956445519095319421",
"225546753762193028464088858133381791816",
"192009587245991263155177277482300609419"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-39857-ce236d3e",
"target": {
"function": "smc_ib_is_sg_need_sync",
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0cdf1fd8fc59d44a48c694324611136910301ef9",
"deprecated": false,
"digest": {
"length": 386.0,
"function_hash": "5348523478696691290241022243621899057"
}
},
{
"id": "CVE-2025-39857-ec5d9eaa",
"target": {
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f18d9b3abf9c6587372cc702f963a7592277ed56",
"deprecated": false,
"digest": {
"line_hashes": [
"316761453972516977319956445519095319421",
"225546753762193028464088858133381791816",
"192009587245991263155177277482300609419"
],
"threshold": 0.9
}
},
{
"id": "CVE-2025-39857-f1105d10",
"target": {
"function": "smc_ib_is_sg_need_sync",
"file": "net/smc/smc_ib.c"
},
"signature_version": "v1",
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f18d9b3abf9c6587372cc702f963a7592277ed56",
"deprecated": false,
"digest": {
"length": 386.0,
"function_hash": "5348523478696691290241022243621899057"
}
}
]