Impact
The vulnerability is a stack memory leak in the RDMA/ionic driver, specifically within the ionic_create_cq() routine. Uninitialized fields expose 7 to 11 bytes of kernel stack data, which could contain sensitive kernel state. The flaw is categorized as a memory leak (CWE-401) and an information‑exposure issue (CWE-908).
Affected Systems
Linux kernels that contain the RDMA/ionic driver from version 6.18 through 7.0 release candidates 1 to 7 are affected. Any distribution using these kernels without the authoritative patch remains vulnerable; this includes both mainline and backport builds that have not yet integrated the fix.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity. The EPSS score is less than 1 %, and the vulnerability is not listed in CISA’s KEV catalog. An attacker with local or privileged access to the RDMA subsystem could trigger ionic_create_cq() and read the leaked bytes. Though currently no public exploit exists, leaking kernel data can aid further privilege escalation or credential theft. The overall risk is moderate, with a low probability of exploitation but potentially significant impact if the data leaked is valuable.
OpenCVE Enrichment