SB20251230200 - NULL pointer dereference in Linux kernel smc
Published: December 30, 2025 Updated: December 30, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2023-54318)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the smcr_port_add() function in net/smc/smc_core.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/06b4934ab2b534bb92935c7601852066ebb9eab8
- https://git.kernel.org/stable/c/70c8d17007dc4a07156b7da44509527990e569b3
- https://git.kernel.org/stable/c/b717463610a27fc0b58484cfead7a623d5913e61
- https://git.kernel.org/stable/c/d1c6c93c27a4bf48006ab16cd9b38d85559d7645
- https://git.kernel.org/stable/c/f5146e3ef0a9eea405874b36178c19a4863b8989
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.195
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.132
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.54
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6