Impact
The vulnerability affects the RDMA/irdma driver in the Linux kernel. When a queue pair is created, a failure in copying data to user space triggers cleanup that waits on a completion object that was never initialized. The uninitialized completion can cause the kernel to block indefinitely or crash, resulting in a denial of service. This flaw is identified as a use-after-initialization weakness (CWE‑457).
Affected Systems
Affecting only the Linux kernel, any system running a kernel build that predates the commit that adds initialization of the free_qp completion is at risk. The relevant updates are contained in the commits referenced in the advisory, such as 11a95521fb93c91e2d4ef9d53dc80ef0a755549b, 3cb88c12461b71c7d9c604aa2e6a9a477ecfa147, and others.
Risk and Exploitability
No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, indicating a low likelihood of widespread exploitation at present. The attack vector is local, requiring the ability to invoke RDMA queue pair creation, which typically needs access to RDMA devices or a privileged user. The fix simply initializes the completion prior to any wait, eliminating the crash path.
OpenCVE Enrichment