In the Linux kernel, the following vulnerability has been resolved:
RDMA/irdma: Fix kernel stack leak in irdmacreateuser_ah()
struct irdmacreateah_resp { // 8 bytes, no padding __u32 ahid; // offset 0 - SET (uresp.ahid = ah->scah.ahinfo.ah_idx) __u8 rsvd[4]; // offset 4 - NEVER SET <- LEAK };
rsvd[4]: 4 bytes of stack memory leaked unconditionally. Only ahid is assigned before ibrespond_udata().
The reserved members of the structure were not zeroed.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23335.json",
"cna_assigner": "Linux"
}