Descripción
In the Linux kernel, following vulnerability has been resolved:
RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work
The cited commit fixed a crash was called for
a cma_id while work on that id from previous call had not yet started.
The item re-initialized in second call, which corrupted the
work currently queue.
However, it left problem queue_work (because is
still pending queue call). In this case,
cma_id_put (which is handler) therefore not
called. This results userspace process (zombie process).
Fix by calling cma_id_put() if fails.
https://git.kernel.org/stable/c/02e45168e0fd6fdc6f8f7c42c4b500857aa5efb0
https://git.kernel.org/stable/c/1ac40736c8c4255d8417b937c9715b193f4a87b3
https://git.kernel.org/stable/c/8b05aa3692e45b8249379dc52b14acc6a104d2e5
https://git.kernel.org/stable/c/92a251c3df8ea1991cd9fe00f1ab0cfce18d7711
https://git.kernel.org/stable/c/ac7897c0124066b9705ffca252a3662d54fc0c9b
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html