CVE-2026-43128 PUBLISHED

RDMA/umem: Fix double dma_buf_unpin in failure path

Assigner: Linux
Reserved: 01.05.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

RDMA/umem: Fix double dma_buf_unpin in failure path

In ib_umem_dmabuf_get_pinned_with_dma_device(), the call to ib_umem_dmabuf_map_pages() can fail. If this occurs, the dmabuf is immediately unpinned but the umem_dmabuf->pinned flag is still set. Then, when ib_umem_release() is called, it calls ib_umem_dmabuf_revoke() which will call dma_buf_unpin() again.

Fix this by removing the immediate unpin upon failure and just let the ib_umem_release/revoke path handle it. This also ensures the proper unmap-unpin unwind ordering if the dmabuf_map_pages call happened to fail due to dma_resv_wait_timeout (and therefore has a non-NULL umem_dmabuf->sgt).

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to 70542b69abff34d24b11ae0bb200cc7a766d18df (excl.)
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to b324327ff6f48d8065dca67eb3b91357e72726bd (excl.)
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to ba3bf0f1bf1d5d0404678485e872980532fcc2c4 (excl.)
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to d3e32e2f3262f1b25d77c085ace38e2cc4ad75cf (excl.)
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to 40126bcbefa79ea86672e05dae608596bab38319 (excl.)
  • affected from 1e4df4a21c5ac722df1099eee30cad9246c889b5 to 104016eb671e19709721c1b0048dd912dc2e96be (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.16 is affected
  • unaffected from 0 to 5.16 (excl.)
  • unaffected from 6.1.165 to 6.1.* (incl.)
  • unaffected from 6.6.128 to 6.6.* (incl.)
  • unaffected from 6.12.75 to 6.12.* (incl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References