CVE-2026-23242
Received Received - Intake
Null Pointer Dereference in Linux Kernel RDMA siw Component

Publication date: 2026-03-18

Last updated on: 2026-04-02

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix potential NULL pointer dereference in header processing If siw_get_hdr() returns -EINVAL before set_rx_fpdu_context(), qp->rx_fpdu can be NULL. The error path in siw_tcp_rx_data() dereferences qp->rx_fpdu->more_ddp_segs without checking, which may lead to a NULL pointer deref. Only check more_ddp_segs when rx_fpdu is present. KASAN splat: [ 101.384271] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7] [ 101.385869] RIP: 0010:siw_tcp_rx_data+0x13ad/0x1e50
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's RDMA/siw component. It involves a potential NULL pointer dereference during header processing. Specifically, if the function siw_get_hdr() returns an error (-EINVAL) before set_rx_fpdu_context() is called, a pointer (qp->rx_fpdu) can be NULL. Later, the function siw_tcp_rx_data() attempts to access a member (more_ddp_segs) of this pointer without checking if it is NULL, which can lead to a NULL pointer dereference and potentially cause a kernel crash or other unintended behavior.


How can this vulnerability impact me? :

The impact of this vulnerability is that it can cause a NULL pointer dereference in the Linux kernel, which may lead to a kernel crash or system instability. This could result in denial of service or unexpected behavior in systems using the affected RDMA/siw component.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart