CVE-2022-50874
Unknown Unknown - Not Provided
Reference Count Leak in Linux Kernel RDMA erdma_mmap Component

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Fix refcount leak in erdma_mmap rdma_user_mmap_entry_get() take reference, we should release it when not need anymore, add the missing rdma_user_mmap_entry_put() in the error path to fix it.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a reference count leak in the Linux kernel's RDMA erdma_mmap component. Specifically, the function rdma_user_mmap_entry_get() takes a reference that should be released when no longer needed, but the code was missing a call to rdma_user_mmap_entry_put() in an error path, causing the reference count to leak.


How can this vulnerability impact me? :

The reference count leak could lead to resource leaks in the kernel, potentially causing increased memory usage or instability in systems using the RDMA erdma_mmap functionality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart