CVE-2025-38151
03.07.2025, 09:15
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work The cited commit fixed a crash when cma_netevent_callback was called for a cma_id while work on that id from a previous call had not yet started. The work item was re-initialized in the second call, which corrupted the work item currently in the work queue. However, it left a problem when queue_work fails (because the item is still pending in the work queue from a previous call). In this case, cma_id_put (which is called in the work handler) is therefore not called. This results in a userspace process hang (zombie process). Fix this by calling cma_id_put() if queue_work fails.Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 6.1.135 ≤ 𝑥 < 6.1.142 |
| linux | linux_kernel | 6.6.88 ≤ 𝑥 < 6.6.94 |
| linux | linux_kernel | 6.12.25 ≤ 𝑥 < 6.12.34 |
| linux | linux_kernel | 6.14.4 ≤ 𝑥 < 6.15 |
| linux | linux_kernel | 6.15.1 ≤ 𝑥 < 6.15.3 |
| linux | linux_kernel | 6.15 |
| linux | linux_kernel | 6.15:rc3 |
| linux | linux_kernel | 6.15:rc4 |
| linux | linux_kernel | 6.15:rc5 |
| linux | linux_kernel | 6.15:rc6 |
| linux | linux_kernel | 6.15:rc7 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
References