CVE-2026-43128
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
06/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/umem: Fix double dma_buf_unpin in failure path<br />
<br />
In ib_umem_dmabuf_get_pinned_with_dma_device(), the call to<br />
ib_umem_dmabuf_map_pages() can fail. If this occurs, the dmabuf<br />
is immediately unpinned but the umem_dmabuf->pinned flag is still<br />
set. Then, when ib_umem_release() is called, it calls<br />
ib_umem_dmabuf_revoke() which will call dma_buf_unpin() again.<br />
<br />
Fix this by removing the immediate unpin upon failure and just let<br />
the ib_umem_release/revoke path handle it. This also ensures the<br />
proper unmap-unpin unwind ordering if the dmabuf_map_pages call<br />
happened to fail due to dma_resv_wait_timeout (and therefore has<br />
a non-NULL umem_dmabuf->sgt).
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/104016eb671e19709721c1b0048dd912dc2e96be
- https://git.kernel.org/stable/c/40126bcbefa79ea86672e05dae608596bab38319
- https://git.kernel.org/stable/c/70542b69abff34d24b11ae0bb200cc7a766d18df
- https://git.kernel.org/stable/c/b324327ff6f48d8065dca67eb3b91357e72726bd
- https://git.kernel.org/stable/c/ba3bf0f1bf1d5d0404678485e872980532fcc2c4
- https://git.kernel.org/stable/c/d3e32e2f3262f1b25d77c085ace38e2cc4ad75cf



