Impact
The bug causes the RDMA umem subsystem to unpin a DMA buffer twice when a mapping failure occurs. The first unpin is performed immediately on failure, but the internal flag is left set. When the buffer is released later, the system attempts to unpin it again, resulting in a double‑unpin operation. Because the description does not indicate any crash or data corruption, the impact remains uncertain; the double unpin may lead to resource mis‑management or kernel instability under certain conditions.
Affected Systems
All Linux kernels that include the RDMA umem code path prior to the series of commits that address the double‑unpin condition are potentially affected. Versions older than the patched revisions (identified by the provided commit hashes) are at risk. No explicit version range is listed, so any system running a pre‑patched kernel should consider this issue.
Risk and Exploitability
The CVSS and EPSS information is not available, so overall risk assessment is limited. The bug manifests when a RDMA buffer mapping fails, requiring an attacker to trigger that failure path; this suggests a local context. Since no public exploitation is known, the likelihood of exploitation is uncertain. The fact that the vulnerability is not listed in the CISA KEV catalog indicates no known, active exploitation.
OpenCVE Enrichment