Impact
The kernel’s IB/mthca driver omitted a call to mthca_unmap_user_db() when the mthca_create_srq() routine failed. This oversight caused an uninitialized kernel memory region to remain mapped, allowing a local user to read kernel data. The weakness is classified as a memory management flaw (CWE‑772) and results in a potential information disclosure; it does not provide direct code execution or privilege escalation.
Affected Systems
The affected product is the Linux kernel, specifically any kernel version that includes the IB/mthca device driver before the patch that adds the missing unmap call. No explicit kernel release numbers are listed in the advisory, so users should verify whether their current kernel contains the commit that fixes the issue.
Risk and Exploitability
The CVSS base score of 5.5 indicates medium severity. The EPSS value is below 1 %, suggesting a low likelihood of exploitation in the wild, and the vulnerability is not cataloged in CISA’s KEV. The attack vector is inferred to be local, requiring a user to trigger a failing mthca_create_srq() system call; the impact is limited to information disclosure through a memory leak, so overall risk remains moderate. Nevertheless, applying the kernel patch eliminates the vulnerability.
OpenCVE Enrichment