CVE-2025-71157
BaseFortify
Publication date: 2026-01-23
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 6.11 (inc) to 6.12.64 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's RDMA core where a device reference count is not properly dropped in the function ib_del_sub_device_and_put(). Specifically, when nldev_deldev() grabs a reference using ib_device_get_by_index() before calling ib_del_sub_device_and_put(), the reference needs to be dropped before returning an error (-EOPNOTSUPP). Failure to do so can lead to improper reference counting.
How can this vulnerability impact me? :
Improper handling of device reference counts can lead to resource leaks or inconsistent device states within the Linux kernel's RDMA subsystem. This may cause system instability or unexpected behavior related to RDMA devices.