We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38161

RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction



Description

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction Upon RQ destruction if the firmware command fails which is the last resource to be destroyed some SW resources were already cleaned regardless of the failure. Now properly rollback the object to its original state upon such failure. In order to avoid a use-after free in case someone tries to destroy the object again, which results in the following kernel trace: refcount_t: underflow; use-after-free. WARNING: CPU: 0 PID: 37589 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148 Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) rfkill mlx5_core(OE) mlxdevm(OE) ib_uverbs(OE) ib_core(OE) psample mlxfw(OE) mlx_compat(OE) macsec tls pci_hyperv_intf sunrpc vfat fat virtio_net net_failover failover fuse loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_console virtio_gpu virtio_blk virtio_dma_buf virtio_mmio dm_mirror dm_region_hash dm_log dm_mod xpmem(OE) CPU: 0 UID: 0 PID: 37589 Comm: python3 Kdump: loaded Tainted: G OE ------- --- 6.12.0-54.el10.aarch64 #1 Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : refcount_warn_saturate+0xf4/0x148 lr : refcount_warn_saturate+0xf4/0x148 sp : ffff80008b81b7e0 x29: ffff80008b81b7e0 x28: ffff000133d51600 x27: 0000000000000001 x26: 0000000000000000 x25: 00000000ffffffea x24: ffff00010ae80f00 x23: ffff00010ae80f80 x22: ffff0000c66e5d08 x21: 0000000000000000 x20: ffff0000c66e0000 x19: ffff00010ae80340 x18: 0000000000000006 x17: 0000000000000000 x16: 0000000000000020 x15: ffff80008b81b37f x14: 0000000000000000 x13: 2e656572662d7265 x12: ffff80008283ef78 x11: ffff80008257efd0 x10: ffff80008283efd0 x9 : ffff80008021ed90 x8 : 0000000000000001 x7 : 00000000000bffe8 x6 : c0000000ffff7fff x5 : ffff0001fb8e3408 x4 : 0000000000000000 x3 : ffff800179993000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000133d51600 Call trace: refcount_warn_saturate+0xf4/0x148 mlx5_core_put_rsc+0x88/0xa0 [mlx5_ib] mlx5_core_destroy_rq_tracked+0x64/0x98 [mlx5_ib] mlx5_ib_destroy_wq+0x34/0x80 [mlx5_ib] ib_destroy_wq_user+0x30/0xc0 [ib_core] uverbs_free_wq+0x28/0x58 [ib_uverbs] destroy_hw_idr_uobject+0x34/0x78 [ib_uverbs] uverbs_destroy_uobject+0x48/0x240 [ib_uverbs] __uverbs_cleanup_ufile+0xd4/0x1a8 [ib_uverbs] uverbs_destroy_ufile_hw+0x48/0x120 [ib_uverbs] ib_uverbs_close+0x2c/0x100 [ib_uverbs] __fput+0xd8/0x2f0 __fput_sync+0x50/0x70 __arm64_sys_close+0x40/0x90 invoke_syscall.constprop.0+0x74/0xd0 do_el0_svc+0x48/0xe8 el0_svc+0x44/0x1d0 el0t_64_sync_handler+0x120/0x130 el0t_64_sync+0x1a4/0x1a8

Reserved 2025-04-16 | Published 2025-07-03 | Updated 2025-07-03 | Assigner Linux

Product status

Default status
unaffected

e2013b212f9f201c71fc5826ce41f39ebece0852 before 26d2f662d3a6655a82fd8a287e8b1ce471567f36
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before f9784da76ad7be66230e829e743bdf68a2c49e56
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before cf32affe6f3801cfb72a65e69c4bc7a8ee9be100
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before 7c4c84cdcc19e89d42f6bf117238e5471173423e
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before 50ac361ff8914133e3cf6ef184bac90c22cb8d79
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before 0a7790cbba654e925243571cf2f24d61603d3ed3
affected

e2013b212f9f201c71fc5826ce41f39ebece0852 before 5d2ea5aebbb2f3ebde4403f9c55b2b057e5dd2d6
affected

Default status
affected

4.5
affected

Any version before 4.5
unaffected

5.10.239
unaffected

5.15.186
unaffected

6.1.142
unaffected

6.6.94
unaffected

6.12.34
unaffected

6.15.3
unaffected

6.16-rc1
unaffected

References

git.kernel.org/...c/26d2f662d3a6655a82fd8a287e8b1ce471567f36

git.kernel.org/...c/f9784da76ad7be66230e829e743bdf68a2c49e56

git.kernel.org/...c/cf32affe6f3801cfb72a65e69c4bc7a8ee9be100

git.kernel.org/...c/7c4c84cdcc19e89d42f6bf117238e5471173423e

git.kernel.org/...c/50ac361ff8914133e3cf6ef184bac90c22cb8d79

git.kernel.org/...c/0a7790cbba654e925243571cf2f24d61603d3ed3

git.kernel.org/...c/5d2ea5aebbb2f3ebde4403f9c55b2b057e5dd2d6

cve.org (CVE-2025-38161)

nvd.nist.gov (CVE-2025-38161)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38161

Support options

Helpdesk Chat, Email, Knowledgebase