CVE-2026-31425
Null Pointer Dereference in Linux RDS IB Causes Kernel Crash
Publication date: 2026-04-13
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's RDS (Reliable Datagram Sockets) over InfiniBand (ib) implementation. It occurs because the system attempts to register FRMR (Fast Registration Memory Region) before the InfiniBand connection is fully established. Specifically, the function rds_ib_get_mr() extracts a connection object that is allocated early but lacks a valid rdma_cm_id (connection identifier). When a sendmsg() call with RDS_CMSG_RDMA_MAP is made on such a fresh connection, the kernel tries to access a null pointer related to the connection's queue pair (qp), causing a kernel crash.
The root cause is that the existing checks only verify if the connection object exists, but do not confirm that the connection identifier and queue pair are valid before proceeding with FRMR registration. This leads to a null pointer dereference and kernel crash.
The fix involves adding checks to ensure that the connection object, connection identifier, and queue pair are all non-NULL before attempting FRMR registration. If the connection is not ready, the function returns an error that triggers a retry mechanism and connection establishment.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a null pointer dereference when handling certain RDMA (Remote Direct Memory Access) operations over InfiniBand connections that are not fully established.
A kernel crash can lead to system instability, downtime, and potential loss of data or service availability. Systems relying on RDS over InfiniBand for high-performance networking could be disrupted, affecting applications and services dependent on these connections.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by adding checks in the Linux kernel code to verify that the connection and its components are fully established before proceeding with FRMR registration. Immediate mitigation involves updating the Linux kernel to a version that includes this fix.
Specifically, the fix adds a check in rds_ib_get_mr() to ensure ic, i_cm_id, and qp are all non-NULL before proceeding, preventing kernel crashes caused by premature FRMR registration.
Until the kernel is updated, avoid using RDS over InfiniBand connections that might trigger this condition, or apply any vendor-provided patches addressing this issue.