-
CVE-2025-38151
- EPSS 0.03%
- Published 03.07.2025 08:35:55
- Last modified 03.07.2025 15:13:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work The cited commit fixed a crash when cma_netevent_callback was called for a cma_id while work on that id from a previous call had not yet started. The work item was re-initialized in the second call, which corrupted the work item currently in the work queue. However, it left a problem when queue_work fails (because the item is still pending in the work queue from a previous call). In this case, cma_id_put (which is called in the work handler) is therefore not called. This results in a userspace process hang (zombie process). Fix this by calling cma_id_put() if queue_work fails.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
1ac40736c8c4255d8417b937c9715b193f4a87b3
Version
51003b2c872c63d28bcf5fbcc52cf7b05615f7b7
Status
affected
Version <
ac7897c0124066b9705ffca252a3662d54fc0c9b
Version
c2b169fc7a12665d8a675c1ff14bca1b9c63fb9a
Status
affected
Version <
02e45168e0fd6fdc6f8f7c42c4b500857aa5efb0
Version
d23fd7a539ac078df119707110686a5b226ee3bb
Status
affected
Version <
8b05aa3692e45b8249379dc52b14acc6a104d2e5
Version
45f5dcdd049719fb999393b30679605f16ebce14
Status
affected
Version <
92a251c3df8ea1991cd9fe00f1ab0cfce18d7711
Version
45f5dcdd049719fb999393b30679605f16ebce14
Status
affected
Version
b172a4a0de254f1fcce7591833a9a63547c2f447
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
6.15
Status
affected
Version <
6.15
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.058 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|