CVE-2026-31425
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/04/2026
Last modified:
18/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
rds: ib: reject FRMR registration before IB connection is established<br />
<br />
rds_ib_get_mr() extracts the rds_ib_connection from conn->c_transport_data<br />
and passes it to rds_ib_reg_frmr() for FRWR memory registration. On a<br />
fresh outgoing connection, ic is allocated in rds_ib_conn_alloc() with<br />
i_cm_id = NULL because the connection worker has not yet called<br />
rds_ib_conn_path_connect() to create the rdma_cm_id. When sendmsg() with<br />
RDS_CMSG_RDMA_MAP is called on such a connection, the sendmsg path parses<br />
the control message before any connection establishment, allowing<br />
rds_ib_post_reg_frmr() to dereference ic->i_cm_id->qp and crash the<br />
kernel.<br />
<br />
The existing guard in rds_ib_reg_frmr() only checks for !ic (added in<br />
commit 9e630bcb7701), which does not catch this case since ic is allocated<br />
early and is always non-NULL once the connection object exists.<br />
<br />
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]<br />
RIP: 0010:rds_ib_post_reg_frmr+0x50e/0x920<br />
Call Trace:<br />
rds_ib_post_reg_frmr (net/rds/ib_frmr.c:167)<br />
rds_ib_map_frmr (net/rds/ib_frmr.c:252)<br />
rds_ib_reg_frmr (net/rds/ib_frmr.c:430)<br />
rds_ib_get_mr (net/rds/ib_rdma.c:615)<br />
__rds_rdma_map (net/rds/rdma.c:295)<br />
rds_cmsg_rdma_map (net/rds/rdma.c:860)<br />
rds_sendmsg (net/rds/send.c:1363)<br />
____sys_sendmsg<br />
do_syscall_64<br />
<br />
Add a check in rds_ib_get_mr() that verifies ic, i_cm_id, and qp are all<br />
non-NULL before proceeding with FRMR registration, mirroring the guard<br />
already present in rds_ib_post_inv(). Return -ENODEV when the connection<br />
is not ready, which the existing error handling in rds_cmsg_send() converts<br />
to -EAGAIN for userspace retry and triggers rds_conn_connect_if_down() to<br />
start the connection worker.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/23e07c340c445f0ebff7757ba15434cb447eb662
- https://git.kernel.org/stable/c/450ec93c0f172374acbf236f1f5f02d53650aa2d
- https://git.kernel.org/stable/c/47de5b73db3b88f45c107393f26aeba26e9e8fae
- https://git.kernel.org/stable/c/6b0a8de67ac0c74e1a7df92b73c862cb36780dfc
- https://git.kernel.org/stable/c/82e4a3b56b23b844802056c9e75a39d24169b0a4
- https://git.kernel.org/stable/c/a54ecccfae62c5c85259ae5ea5d9c20009519049
- https://git.kernel.org/stable/c/a5bfd14c9a299e6db4add4440430ee5e010b03ad
- https://git.kernel.org/stable/c/c506456ebf84c50ed9327473d4e9bd905def212b



