In the Linux kernel, the following vulnerability has been resolved:
ksmbd: smbdirect: validate dataoffset and datalength field of smbdirectdata_transfer
If dataoffset and datalength of smbdirectdatatransfer struct are invalid, out of bounds issue could happen. This patch validate dataoffset and datalength field in recvdone.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39943.json"
}[
{
"digest": {
"length": 2681.0,
"function_hash": "246152058370829863461052189413692237656"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-39943-319f14cc",
"target": {
"function": "recv_done",
"file": "fs/ksmbd/transport_rdma.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@773fddf976d282ef059c36c575ddb81567acd6bc"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"97483965709364907986599654916569378124",
"233841644832884972705878310554461081274",
"263947883857009090137351204904166763165",
"234391270309511785071080189674749604222",
"13443916399474112880806909335428695951",
"153838701553884055007644531862138267046",
"8653010131911660781526376274066883829",
"235880850612789479500254958568579315138",
"8953042264761112123808388529423081298",
"207418059424973972993851824196140215664",
"231889680007417767580673147314989419821",
"64186206153781141980110095959641608256",
"71388967233363832846672806646211010387",
"247497218241187396935665340072145458187"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-39943-82a562d3",
"target": {
"file": "fs/ksmbd/transport_rdma.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@773fddf976d282ef059c36c575ddb81567acd6bc"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"97483965709364907986599654916569378124",
"233841644832884972705878310554461081274",
"263947883857009090137351204904166763165",
"234391270309511785071080189674749604222",
"13443916399474112880806909335428695951",
"153838701553884055007644531862138267046",
"8653010131911660781526376274066883829",
"235880850612789479500254958568579315138",
"8953042264761112123808388529423081298",
"207418059424973972993851824196140215664",
"231889680007417767580673147314989419821",
"64186206153781141980110095959641608256",
"71388967233363832846672806646211010387",
"247497218241187396935665340072145458187"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2025-39943-c5e31aee",
"target": {
"file": "fs/smb/server/transport_rdma.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb0378dde086363046ed3d7db7f126fc3f76fd70"
},
{
"digest": {
"length": 2681.0,
"function_hash": "246152058370829863461052189413692237656"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2025-39943-ce1bab39",
"target": {
"function": "recv_done",
"file": "fs/smb/server/transport_rdma.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eb0378dde086363046ed3d7db7f126fc3f76fd70"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-39943.json"