RHEL-9.6: CVE-2025-37750 Kernel panic during a CIFS mount

Solution Verified - Updated -

Issue

[130462.394364] CIFS: enabling forceuid mount option implicitly because uid= option is specified
[130462.394367] CIFS: enabling forcegid mount option implicitly because gid= option is specified
[130462.394369] CIFS: Attempting to mount //abc.de.fg.hi.COM/jk-lm-no-01
[130462.443127] CIFS: VFS: \\abc.de.fg.hi.COM failed to connect to IPC (rc=-115)
[130462.443150] CIFS: VFS: session 00000000bf0f68bc has no tcon available for a dfs referral request
[130462.443158] BUG: kernel NULL pointer dereference, address: 0000000000000000
[130462.443160] #PF: supervisor instruction fetch in kernel mode
[130462.443161] #PF: error_code(0x0010) - not-present page
[130462.443162] PGD 0 
[130462.443163] Oops: 0010 [#1] PREEMPT SMP NOPTI
[130462.443164] CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Not tainted 5.14.0-570.21.1.el9_6.x86_64 #1
[130462.443166] Hardware name: Supermicro SYS-121C-TN10R/X13DDW-A, BIOS 2.4 09/23/2024
[130462.443171] CIFS: VFS: cifs_mount failed w/return code = -115
[130462.443166] RIP: 0010:0x0
[130462.443179] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[130462.443180] RSP: 0018:ff613bedc00fced0 EFLAGS: 00010246
[130462.443181] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffffc0abbca0
[130462.443182] RDX: ff487ee90b0abdc0 RSI: ff487f098d0b89a8 RDI: ff487ee9b9647400
[130462.443182] RBP: 0000000000000000 R08: 0000000000000001 R09: fc837170679e04d7
[130462.443183] R10: ffffffff8b2060c0 R11: ff613bedc00f0001 R12: ff487ee90c9aa060
[130462.443183] R13: ff487ee90b0abdc0 R14: ff487ee9b9647400 R15: 0000000000000002
[130462.443184] FS:  0000000000000000(0000) GS:ff487f07ff840000(0000) knlGS:0000000000000000
[130462.443185] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[130462.443186] CR2: ffffffffffffffd6 CR3: 00000011f7810002 CR4: 0000000000773ef0
[130462.443187] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[130462.443187] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[130462.443188] PKRU: 55555554
[130462.443188] Call Trace:
[130462.443189]  <IRQ>
[130462.443194]  ? show_trace_log_lvl+0x1c4/0x2df
[130462.443200]  ? show_trace_log_lvl+0x1c4/0x2df
[130462.443206]  ? qat_alg_callback+0x1a/0x30 [intel_qat]
[130462.443233]  ? __die_body.cold+0x8/0xd
[130462.443235]  ? page_fault_oops+0x134/0x170
[130462.443241]  ? exc_page_fault+0x62/0x150
[130462.443246]  ? asm_exc_page_fault+0x22/0x30
[130462.443250]  ? __pfx_qat_alg_callback+0x10/0x10 [intel_qat]
[130462.443266]  qat_alg_callback+0x1a/0x30 [intel_qat]
[130462.443278]  adf_ring_response_handler+0xb6/0x170 [intel_qat]
[130462.443293]  adf_response_handler+0x17/0x40 [intel_qat]
[130462.443306]  tasklet_action_common.constprop.0+0x117/0x120
[130462.443311]  handle_softirqs+0xce/0x270
[130462.443315]  __irq_exit_rcu+0xa3/0xc0
[130462.443317]  common_interrupt+0x80/0xa0
[130462.443320]  </IRQ>
[130462.443320]  <TASK>
[130462.443321]  asm_common_interrupt+0x22/0x40
[130462.443322] RIP: 0010:cpuidle_enter_state+0xbc/0x420
[130462.443324] Code: e6 01 00 00 e8 75 32 46 ff e8 90 ed ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 91 fc 44 ff 45 84 ff 0f 85 3f 01 00 00 fb 45 85 f6 <0f> 88 a0 01 00 00 49 63 d6 4c 2b 2c 24 48 8d 04 52 48 8d 04 82 49
[130462.443325] RSP: 0018:ff613bedc057be80 EFLAGS: 00000206
[130462.443326] RAX: ff487f07ff8738c0 RBX: 0000000000000003 RCX: 000000000000001f
[130462.443326] RDX: 0000000000000000 RSI: 0000000040000000 RDI: 0000000000000000
[130462.443327] RBP: ff487f07ff87f3f8 R08: 000076a7a794a48e R09: 0000000000000007
[130462.443328] R10: 0000000000000006 R11: ff487f07ff871b24 R12: ffffffff8b6d0a80
[130462.443328] R13: 000076a7a794a48e R14: 0000000000000003 R15: 0000000000000000
[130462.443335]  cpuidle_enter+0x29/0x40
[130462.443339]  cpuidle_idle_call+0xfa/0x160
[130462.443343]  do_idle+0x7b/0xe0
[130462.443344]  cpu_startup_entry+0x26/0x30
[130462.443346]  start_secondary+0x115/0x140
[130462.443349]  secondary_startup_64_no_verify+0x187/0x18b
[130462.443356]  </TASK>
[130462.443357] Modules linked in: loop binfmt_misc nfsv3 nfs_acl nfs lockd grace fscache netfs nls_utf8 cifs cifs_arc4 rdma_cm iw_cm ib_cm ib_core cifs_md4 dns_resolver bonding tls vfat fat ipmi_ssif intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common intel_ifs i10nm_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm rapl intel_cstate pmt_telemetry iTCO_wdt iTCO_vendor_support pmt_class intel_sdsi ses enclosure mei_me isst_if_mmio isst_if_mbox_pci pcspkr scsi_transport_sas intel_uncore mei isst_if_common intel_vsec i2c_i801 i2c_ismt i2c_smbus acpi_power_meter ipmi_si acpi_ipmi ipmi_devintf ipmi_msghandler acpi_pad joydev pfr_update pfr_telemetry auth_rpcgss sunrpc xfs libcrc32c dm_crypt sd_mod sg ast i2c_algo_bit drm_shmem_helper drm_kms_helper ahci iaa_crypto qat_4xxx libahci drm ixgbe crct10dif_pclmul intel_qat crc32_pclmul crc32c_intel libata megaraid_sas idxd ghash_clmulni_intel rfkill mdio idxd_bus crc8 dca wmi pinctrl_emmitsburg rndis_host cdc_ether
[130462.443396]  usbnet mii dm_mirror dm_region_hash dm_log dm_mod fuse
[130462.443399] CR2: 0000000000000000

Environment

  • Red Hat Enterprise Linux 9.6
  • kernel-5.14.0-570.21.1.el9_6 or prior version in RHEL-9.6.

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content