Impact
The vulnerability is a kernel stack memory leak in the RDMA/irdma driver. During creation of a user address handle, the driver’s response structure leaves four reserved bytes uninitialized. Only the handle ID is set, so the four bytes retain whatever stack data was present at the time. A malicious actor with RDMA access can invoke the irdma_create_user_ah operation and read these bytes, potentially exposing sensitive kernel state or data. The vulnerability is therefore an information‑disclosure flaw that could reveal kernel memory contents.
Affected Systems
All Linux kernel builds that include the irdma RDMA driver are affected, as the issue is in the generic kernel source code. No specific version range is specified, so any kernel with the irdma module could be impacted until the fix is applied.
Risk and Exploitability
The CVSS v3 score of 5.5 indicates moderate severity, and the EPSS score of under 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires RDMA device support and the ability to create an address handle, so exposure depends on RDMA hardware presence and the attacker’s ability to communicate with the RDMA service. Overall risk is moderate but can be mitigated by applying the kernel patch or reducing RDMA exposure.
OpenCVE Enrichment