CVE-2022-50874
Description
In the Linux kernel, the following vulnerability has been resolved:
RDMA/erdma: Fix refcount leak in erdma_mmap
rdma_user_mmap_entry_get() take reference, we should release it when not need anymore, add the missing rdma_user_mmap_entry_put() in the error path to fix it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A refcount leak in the Linux kernel RDMA/erdma driver's mmap handling can lead to resource exhaustion; fixed by adding a missing put.
Vulnerability
In the Linux kernel's RDMA/erdma driver, the erdma_mmap function calls rdma_user_mmap_entry_get() to obtain a reference to a memory mapping entry. However, in certain error paths, the corresponding rdma_user_mmap_entry_put() was missing, causing a reference count leak. This means the entry's reference counter is not properly decremented, leading to the entry never being freed.
Exploitation
To exploit this, an attacker would need local access to the system and the ability to invoke the mmap system call on an RDMA device file. The vulnerability does not require special privileges beyond normal user access to RDMA resources, but the attacker must be able to trigger the error path in the mmap handling. This could be achieved by providing invalid parameters or causing the mmap to fail after the reference has been acquired.
Impact
An attacker repeatedly triggering this vulnerability could exhaust kernel memory by causing an accumulation of unreleased memory mapping entries. This can lead to denial of service (system instability or crash) due to memory exhaustion. There is no evidence of code execution or privilege escalation.
Mitigation
The fix was included in the Linux kernel stable tree via commit 410f0f46ffca [1]. Users should update their kernels to a version containing this patch. No workaround is available other than applying the update. The vulnerability has a CVSS score of 5.5 (medium) and is not known to be exploited in the wild.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
38372207b009d410f0f46ffcaee84146c05adVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.