CVE-2026-23335

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() struct irdma_create_ah_resp { // 8 bytes, no padding __u32 ah_id; // offset 0 - SET (uresp.ah_id = ah->sc_ah.ah_info.ah_idx) __u8 rsvd[4]; // offset 4 - NEVER SET <- LEAK }; rsvd[4]: 4 bytes of stack memory leaked unconditionally. Only ah_id is assigned before ib_respond_udata(). The reserved members of the structure were not zeroed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

History

23 Apr 2026, 21:13

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/14b47c07c69930254f549a17ee245c80a65b1609 - () https://git.kernel.org/stable/c/14b47c07c69930254f549a17ee245c80a65b1609 - Patch
References () https://git.kernel.org/stable/c/1b1fac4c7a3ab7f52e9cfb91e5c91216646ca4d8 - () https://git.kernel.org/stable/c/1b1fac4c7a3ab7f52e9cfb91e5c91216646ca4d8 - Patch
References () https://git.kernel.org/stable/c/1f70df004fdd944653013ccc2e1dfd472a693b46 - () https://git.kernel.org/stable/c/1f70df004fdd944653013ccc2e1dfd472a693b46 - Patch
References () https://git.kernel.org/stable/c/2fd37450d271d74b3847baed284f9cfdf198c6f8 - () https://git.kernel.org/stable/c/2fd37450d271d74b3847baed284f9cfdf198c6f8 - Patch
References () https://git.kernel.org/stable/c/74586c6da9ea222a61c98394f2fc0a604748438c - () https://git.kernel.org/stable/c/74586c6da9ea222a61c98394f2fc0a604748438c - Patch
References () https://git.kernel.org/stable/c/c9bd0007c4bdb7806bbd323287e50f9cf467c51a - () https://git.kernel.org/stable/c/c9bd0007c4bdb7806bbd323287e50f9cf467c51a - Patch
References () https://git.kernel.org/stable/c/cfe962216c164fe2b1c1fb6ac925a7413f5abc84 - () https://git.kernel.org/stable/c/cfe962216c164fe2b1c1fb6ac925a7413f5abc84 - Patch

18 Apr 2026, 09:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/1f70df004fdd944653013ccc2e1dfd472a693b46 -
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: RDMA/irdma: Corrección de fuga de pila del kernel en irdma_create_user_ah() struct irdma_create_ah_resp { // 8 bytes, sin relleno __u32 ah_id; // desplazamiento 0 - ESTABLECIDO (uresp.ah_id = ah-&gt;sc_ah.ah_info.ah_idx) __u8 rsvd[4]; // desplazamiento 4 - NUNCA ESTABLECIDO &lt;- FUGA }; rsvd[4]: 4 bytes de memoria de pila filtrados incondicionalmente. Solo ah_id se asigna antes de ib_respond_udata(). Los miembros reservados de la estructura no fueron puestos a cero.

25 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 11:16

Updated : 2026-04-23 21:13


NVD link : CVE-2026-23335

Mitre link : CVE-2026-23335

CVE.ORG link : CVE-2026-23335


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime