-

CVE-2025-71084

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cm: Fix leaking the multicast GID table reference

If the CM ID is destroyed while the CM event for multicast creating is
still queued the cancel_work_sync() will prevent the work from running
which also prevents destroying the ah_attr. This leaks a refcount and
triggers a WARN:

   GID entry ref leak for dev syz1 index 2 ref=573
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886

Destroy the ah_attr after canceling the work, it is safe to call this
twice.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < d5ce588a9552878859a4d44b70b724216c188a5f
Version 60d613b39e8d0c9f3b526e9c96445422b4562d76
Status affected
Version < abf38398724ecc888f62c678d288da40d11878af
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version < ab668a58c4a2ccb6d54add7a76f2f955d15d0196
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version < c0acdee513239e1d6e1b490f56be0e6837dfd162
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version < 5cb34bb5fd726491b809efbeb5cfd63ae5bf9cf3
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version < 3ba6d01c4b3c584264dc733c6a2ecc5bbc8e0bb5
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version < 57f3cb6c84159d12ba343574df2115fb18dd83ca
Version fe454dc31e84f8c14cb8942fcb61666c9f40745b
Status affected
Version a3262b3884dd67b4c5632ce7cdf9cff9d1a575d4
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.12
Status affected
Version < 5.12
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.64
Status unaffected
Version <= 6.18.*
Version 6.18.4
Status unaffected
Version <= *
Version 6.19-rc4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.