Impact
The vulnerability affects the RDMA/irdma driver in the Linux kernel. When a queue pair is created, a failure in copying data to user space triggers cleanup that waits on a completion object that was never initialized. The uninitialized completion can cause the kernel to block indefinitely or crash, resulting in a denial of service. This flaw is identified as a use‑after‑initialization weakness (CWE‑908).
Affected Systems
Affecting only the Linux kernel, any system running a kernel build that predates the commit that adds initialization of the free_qp completion is at risk. The relevant updates are contained in the commits referenced in the advisory, such as 11a95521fb93c91e2d4ef9d53dc80ef0a755549b, 3cb88c12461b71c7d9c604aa2e6a9a477ecfa147, and others.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity vulnerability, and the EPSS score of < 1% indicates a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local; it is triggered when a user attempts to create an RDMA queue pair which requires access to RDMA devices or privileged execution. The flaw is mitigated by initializing the completion before the ib_copy_to_udata call, preventing the kernel from blocking or crashing during cleanup.
OpenCVE Enrichment
Debian DLA
Debian DSA