Home

Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read in irdma_net_event irdma_net_event() should not dereference anything from "neigh" (alias "ptr") until it has checked that the event is NETEVENT_NEIGH_UPDATE. Other events come with different structures pointed to by "ptr" and they may be smaller than struct neighbour. Move the read of neigh->dev under the NETEVENT_NEIGH_UPDATE case. The bug is mostly harmless, but it triggers KASAN on debug kernels: BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma] Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554 CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1 Hardware name: [...] Workqueue: events rt6_probe_deferred Call Trace: <IRQ> dump_stack_lvl+0x60/0xb0 print_address_description.constprop.0+0x2c/0x3f0 print_report+0xb4/0x270 kasan_report+0x92/0xc0 irdma_net_event+0x32e/0x3b0 [irdma] notifier_call_chain+0x9e/0x180 atomic_notifier_call_chain+0x5c/0x110 rt6_do_redirect+0xb91/0x1080 tcp_v6_err+0xe9b/0x13e0 icmpv6_notify+0x2b2/0x630 ndisc_redirect_rcv+0x328/0x530 icmpv6_rcv+0xc16/0x1360 ip6_protocol_deliver_rcu+0xb84/0x12e0 ip6_input_finish+0x117/0x240 ip6_input+0xc4/0x370 ipv6_rcv+0x420/0x7d0 __netif_receive_skb_one_core+0x118/0x1b0 process_backlog+0xd1/0x5d0 __napi_poll.constprop.0+0xa3/0x440 net_rx_action+0x78a/0xba0 handle_softirqs+0x2d4/0x9c0 do_softirq+0xad/0xe0 </IRQ>

PUBLISHED Reserved 2026-01-13 | Published 2026-01-14 | Updated 2026-01-19 | Assigner Linux

Product status

Default status
unaffected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before db93ae6fa66f1c61ae63400191195e3ee58021da
affected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before 305c02e541befe4a44ffde30ed374970f41aeb6c
affected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before fc23d05f0b3fb4d80657e7afebae2cae686b31c8
affected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before bf197c7c79ef6458d1ee84dd7db251b51784885f
affected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before d9b9affd103f51b42322da4ed5ac025b560bc354
affected

915cc7ac0f8e2a23675ee896e87f17c7d3c47089 (git) before 6f05611728e9d0ab024832a4f1abb74a5f5d0bb0
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

5.15.198 (semver)
unaffected

6.1.160 (semver)
unaffected

6.6.120 (semver)
unaffected

6.12.64 (semver)
unaffected

6.18.4 (semver)
unaffected

6.19-rc4 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/db93ae6fa66f1c61ae63400191195e3ee58021da

git.kernel.org/...c/305c02e541befe4a44ffde30ed374970f41aeb6c

git.kernel.org/...c/fc23d05f0b3fb4d80657e7afebae2cae686b31c8

git.kernel.org/...c/bf197c7c79ef6458d1ee84dd7db251b51784885f

git.kernel.org/...c/d9b9affd103f51b42322da4ed5ac025b560bc354

git.kernel.org/...c/6f05611728e9d0ab024832a4f1abb74a5f5d0bb0

cve.org (CVE-2025-71133)

nvd.nist.gov (CVE-2025-71133)

Download JSON