Use-After-Free Vulnerability in Linux Kernel's RDMA ERDMA Component
CVE-2025-22088
7.8HIGH
Summary
The vulnerability in the Linux kernel's RDMA component involves a use-after-free error related to the erdma_accept_newconn() function. Specifically, after calling erdma_cep_put(new_cep), the object new_cep is freed. If a subsequent dereference is attempted, it leads to a use-after-free condition, potentially allowing for arbitrary code execution or system compromise if exploited. This flaw underscores the importance of secure memory management in kernel space to prevent unintended access to deallocated resources.
Affected Version(s)
Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a
Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a < 667a628ab67d359166799fad89b3c6909599558a
Linux 920d93eac8b97778fef48f34f10e58ddf870fc2a
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published