Home

Description

In the Linux kernel, the following vulnerability has been resolved: cifs: prevent NULL pointer dereference in UTF16 conversion There can be a NULL pointer dereference bug here. NULL is passed to __cifs_sfu_make_node without checks, which passes it unchecked to cifs_strndup_to_utf16, which in turn passes it to cifs_local_to_utf16_bytes where '*from' is dereferenced, causing a crash. This patch adds a check for NULL 'src' in cifs_strndup_to_utf16 and returns NULL early to prevent dereferencing NULL pointer. Found by Linux Verification Center (linuxtesting.org) with SVACE

PUBLISHED Reserved 2025-04-16 | Published 2025-09-19 | Updated 2025-11-03 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 65b98a7e65e7a8f3894d8760cd194eaf20504c99
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1cfa5dd05847137f0fb3ce74ced80c0b4858d716
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1f797f062b5cf13a1c2bcc23285361baaa7c9260
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 3c26a8d30ed6b53a52a023ec537dc50a6d34a67a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 70bccd9855dae56942f2b18a08ba137bb54093a0
affected

Default status
affected

6.1.151 (semver)
unaffected

6.6.105 (semver)
unaffected

6.12.46 (semver)
unaffected

6.16.6 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

lists.debian.org/debian-lts-announce/2025/10/msg00008.html

git.kernel.org/...c/65b98a7e65e7a8f3894d8760cd194eaf20504c99

git.kernel.org/...c/1cfa5dd05847137f0fb3ce74ced80c0b4858d716

git.kernel.org/...c/1f797f062b5cf13a1c2bcc23285361baaa7c9260

git.kernel.org/...c/3c26a8d30ed6b53a52a023ec537dc50a6d34a67a

git.kernel.org/...c/70bccd9855dae56942f2b18a08ba137bb54093a0

cve.org (CVE-2025-39838)

nvd.nist.gov (CVE-2025-39838)

Download JSON