{"id":"CVE-2025-71133","summary":"RDMA/irdma: avoid invalid read in irdma_net_event","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: avoid invalid read in irdma_net_event\n\nirdma_net_event() should not dereference anything from \"neigh\" (alias\n\"ptr\") until it has checked that the event is NETEVENT_NEIGH_UPDATE.\nOther events come with different structures pointed to by \"ptr\" and they\nmay be smaller than struct neighbour.\n\nMove the read of neigh-\u003edev under the NETEVENT_NEIGH_UPDATE case.\n\nThe bug is mostly harmless, but it triggers KASAN on debug kernels:\n\n BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma]\n Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554\n\n CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1\n Hardware name: [...]\n Workqueue: events rt6_probe_deferred\n Call Trace:\n  \u003cIRQ\u003e\n  dump_stack_lvl+0x60/0xb0\n  print_address_description.constprop.0+0x2c/0x3f0\n  print_report+0xb4/0x270\n  kasan_report+0x92/0xc0\n  irdma_net_event+0x32e/0x3b0 [irdma]\n  notifier_call_chain+0x9e/0x180\n  atomic_notifier_call_chain+0x5c/0x110\n  rt6_do_redirect+0xb91/0x1080\n  tcp_v6_err+0xe9b/0x13e0\n  icmpv6_notify+0x2b2/0x630\n  ndisc_redirect_rcv+0x328/0x530\n  icmpv6_rcv+0xc16/0x1360\n  ip6_protocol_deliver_rcu+0xb84/0x12e0\n  ip6_input_finish+0x117/0x240\n  ip6_input+0xc4/0x370\n  ipv6_rcv+0x420/0x7d0\n  __netif_receive_skb_one_core+0x118/0x1b0\n  process_backlog+0xd1/0x5d0\n  __napi_poll.constprop.0+0xa3/0x440\n  net_rx_action+0x78a/0xba0\n  handle_softirqs+0x2d4/0x9c0\n  do_softirq+0xad/0xe0\n  \u003c/IRQ\u003e","modified":"2026-04-02T13:04:50.822218Z","published":"2026-01-14T15:07:48.524Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71133.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/305c02e541befe4a44ffde30ed374970f41aeb6c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f05611728e9d0ab024832a4f1abb74a5f5d0bb0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bf197c7c79ef6458d1ee84dd7db251b51784885f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d9b9affd103f51b42322da4ed5ac025b560bc354"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db93ae6fa66f1c61ae63400191195e3ee58021da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc23d05f0b3fb4d80657e7afebae2cae686b31c8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71133.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71133"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"915cc7ac0f8e2a23675ee896e87f17c7d3c47089"},{"fixed":"db93ae6fa66f1c61ae63400191195e3ee58021da"},{"fixed":"305c02e541befe4a44ffde30ed374970f41aeb6c"},{"fixed":"fc23d05f0b3fb4d80657e7afebae2cae686b31c8"},{"fixed":"bf197c7c79ef6458d1ee84dd7db251b51784885f"},{"fixed":"d9b9affd103f51b42322da4ed5ac025b560bc354"},{"fixed":"6f05611728e9d0ab024832a4f1abb74a5f5d0bb0"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71133.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.14.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71133.json"}}],"schema_version":"1.7.5"}