{
   "containers": {
      "cna": {
         "providerMetadata": {
            "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038"
         },
         "descriptions": [
            {
               "lang": "en",
               "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw\n\nWhen running blktests nvme/rdma, the following kmemleak issue will appear.\n\nkmemleak: Kernel memory leak detector initialized (mempool available:36041)\nkmemleak: Automatic memory scanning thread started\nkmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nkmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nkmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nkmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\n\nunreferenced object 0xffff88855da53400 (size 192):\n  comm \"rdma\", pid 10630, jiffies 4296575922\n  hex dump (first 32 bytes):\n    37 00 00 00 00 00 00 00 c0 ff ff ff 1f 00 00 00  7...............\n    10 34 a5 5d 85 88 ff ff 10 34 a5 5d 85 88 ff ff  .4.].....4.]....\n  backtrace (crc 47f66721):\n    [<ffffffff911251bd>] kmalloc_trace+0x30d/0x3b0\n    [<ffffffffc2640ff7>] alloc_gid_entry+0x47/0x380 [ib_core]\n    [<ffffffffc2642206>] add_modify_gid+0x166/0x930 [ib_core]\n    [<ffffffffc2643468>] ib_cache_update.part.0+0x6d8/0x910 [ib_core]\n    [<ffffffffc2644e1a>] ib_cache_setup_one+0x24a/0x350 [ib_core]\n    [<ffffffffc263949e>] ib_register_device+0x9e/0x3a0 [ib_core]\n    [<ffffffffc2a3d389>] 0xffffffffc2a3d389\n    [<ffffffffc2688cd8>] nldev_newlink+0x2b8/0x520 [ib_core]\n    [<ffffffffc2645fe3>] rdma_nl_rcv_msg+0x2c3/0x520 [ib_core]\n    [<ffffffffc264648c>]\nrdma_nl_rcv_skb.constprop.0.isra.0+0x23c/0x3a0 [ib_core]\n    [<ffffffff9270e7b5>] netlink_unicast+0x445/0x710\n    [<ffffffff9270f1f1>] netlink_sendmsg+0x761/0xc40\n    [<ffffffff9249db29>] __sys_sendto+0x3a9/0x420\n    [<ffffffff9249dc8c>] __x64_sys_sendto+0xdc/0x1b0\n    [<ffffffff92db0ad3>] do_syscall_64+0x93/0x180\n    [<ffffffff92e00126>] entry_SYSCALL_64_after_hwframe+0x71/0x79\n\nThe root cause: rdma_put_gid_attr is not called when sgid_attr is set\nto ERR_PTR(-ENODEV)."
            }
         ],
         "affected": [
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "unaffected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "programFiles": [
                  "drivers/infiniband/core/cma.c"
               ],
               "versions": [
                  {
                     "version": "f8ef1be816bf",
                     "lessThan": "3eb127dc408b",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "f8ef1be816bf",
                     "lessThan": "6564fc181840",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "f8ef1be816bf",
                     "lessThan": "b3a7fb93afd8",
                     "status": "affected",
                     "versionType": "git"
                  },
                  {
                     "version": "f8ef1be816bf",
                     "lessThan": "9c0731832d3b",
                     "status": "affected",
                     "versionType": "git"
                  }
               ]
            },
            {
               "product": "Linux",
               "vendor": "Linux",
               "defaultStatus": "affected",
               "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               "programFiles": [
                  "drivers/infiniband/core/cma.c"
               ],
               "versions": [
                  {
                     "version": "6.6",
                     "status": "affected"
                  },
                  {
                     "version": "0",
                     "lessThan": "6.6",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.6.33",
                     "lessThanOrEqual": "6.6.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.8.12",
                     "lessThanOrEqual": "6.8.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.9.3",
                     "lessThanOrEqual": "6.9.*",
                     "status": "unaffected",
                     "versionType": "custom"
                  },
                  {
                     "version": "6.10",
                     "lessThanOrEqual": "*",
                     "status": "unaffected",
                     "versionType": "original_commit_for_fix"
                  }
               ]
            }
         ],
         "references": [
            {
               "url": "https://git.kernel.org/stable/c/3eb127dc408bf7959a4920d04d16ce10e863686a"
            },
            {
               "url": "https://git.kernel.org/stable/c/6564fc1818404254d1c9f7d75b403b4941516d26"
            },
            {
               "url": "https://git.kernel.org/stable/c/b3a7fb93afd888793ef226e9665fbda98a95c48e"
            },
            {
               "url": "https://git.kernel.org/stable/c/9c0731832d3b7420cbadba6a7f334363bc8dfb15"
            }
         ],
         "title": "RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw",
         "x_generator": {
            "engine": "bippy-c9c4e1df01b2"
         }
      }
   },
   "cveMetadata": {
      "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038",
      "cveID": "CVE-2024-38539",
      "requesterUserId": "gregkh@kernel.org",
      "serial": "1",
      "state": "PUBLISHED"
   },
   "dataType": "CVE_RECORD",
   "dataVersion": "5.0"
}
