VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50874

CVE-2022-50874

Description

In the Linux kernel, the following vulnerability has been resolved:

RDMA/erdma: Fix refcount leak in erdma_mmap

rdma_user_mmap_entry_get() take reference, we should release it when not need anymore, add the missing rdma_user_mmap_entry_put() in the error path to fix it.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A refcount leak in the Linux kernel RDMA/erdma driver's mmap handling can lead to resource exhaustion; fixed by adding a missing put.

Vulnerability

In the Linux kernel's RDMA/erdma driver, the erdma_mmap function calls rdma_user_mmap_entry_get() to obtain a reference to a memory mapping entry. However, in certain error paths, the corresponding rdma_user_mmap_entry_put() was missing, causing a reference count leak. This means the entry's reference counter is not properly decremented, leading to the entry never being freed.

Exploitation

To exploit this, an attacker would need local access to the system and the ability to invoke the mmap system call on an RDMA device file. The vulnerability does not require special privileges beyond normal user access to RDMA resources, but the attacker must be able to trigger the error path in the mmap handling. This could be achieved by providing invalid parameters or causing the mmap to fail after the reference has been acquired.

Impact

An attacker repeatedly triggering this vulnerability could exhaust kernel memory by causing an accumulation of unreleased memory mapping entries. This can lead to denial of service (system instability or crash) due to memory exhaustion. There is no evidence of code execution or privilege escalation.

Mitigation

The fix was included in the Linux kernel stable tree via commit 410f0f46ffca [1]. Users should update their kernels to a version containing this patch. No workaround is available other than applying the update. The vulnerability has a CVSS score of 5.5 (medium) and is not known to be exploited in the wild.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.