In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_cep_put(new_cep) being called, new_cep will be freed, and the following dereference will cause a UAF problem. Fix this issue.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025041616-CVE-2025-22088-ae2e@gregkh/T