Use-After-Free Vulnerability in Linux Kernel's RDMA ERDMA Component
CVE-2025-22088

7.8HIGH

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
16 April 2025

Summary

The vulnerability in the Linux kernel's RDMA component involves a use-after-free error related to the erdma_accept_newconn() function. Specifically, after calling erdma_cep_put(new_cep), the object new_cep is freed. If a subsequent dereference is attempted, it leads to a use-after-free condition, potentially allowing for arbitrary code execution or system compromise if exploited. This flaw underscores the importance of secure memory management in kernel space to prevent unintended access to deallocated resources.

Affected Version(s)

Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a

Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a < 667a628ab67d359166799fad89b3c6909599558a

Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.