Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-71084

CVE-2025-71084: Linux Kernel RDMA/cm Reference Leak Flaw

CVE-2025-71084 is a reference leak flaw in Linux kernel RDMA/cm that causes GID table entry leaks when CM IDs are destroyed during multicast creation. This article covers technical details, affected versions, and fixes.

Updated: January 22, 2026

CVE-2025-71084 Overview

CVE-2025-71084 is a memory leak vulnerability in the Linux kernel's RDMA (Remote Direct Memory Access) Connection Manager (CM) subsystem. The vulnerability occurs when a CM ID is destroyed while the CM event for multicast creation is still queued. In this scenario, cancel_work_sync() prevents the queued work from executing, which in turn prevents the proper destruction of the ah_attr structure. This results in a leaked reference count to the multicast GID (Global Identifier) table.

Critical Impact

This vulnerability can cause GID table reference leaks in InfiniBand devices, triggering kernel warnings and potentially leading to resource exhaustion over time in systems utilizing RDMA multicast functionality.

Affected Products

  • Linux kernel with RDMA/CM subsystem enabled
  • Systems utilizing InfiniBand multicast functionality
  • Kernel versions prior to the patched stable releases

Discovery Timeline

  • 2026-01-13 - CVE CVE-2025-71084 published to NVD
  • 2026-01-13 - Last updated in NVD database

Technical Details for CVE-2025-71084

Vulnerability Analysis

The vulnerability resides in the Linux kernel's RDMA Connection Manager, specifically in the handling of multicast group operations. When a user application creates a multicast connection, the kernel allocates resources including a reference to the GID table entry. The CM subsystem uses work queues to process events asynchronously, including multicast creation events.

The flaw occurs during the teardown sequence when a CM ID is destroyed while a multicast creation event is still pending in the work queue. The cancel_work_sync() function is called to cancel any pending work, but this prevents the normal execution path that would properly release the ah_attr (Address Handle Attributes) structure and its associated GID table reference.

The kernel generates a warning message indicating the leak:

GID entry ref leak for dev syz1 index 2 ref=573
WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]
WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886

Root Cause

The root cause is improper resource cleanup in the RDMA CM destruction path. When cancel_work_sync() is invoked to cancel pending multicast creation work, the code fails to account for resources that would have been freed by the canceled work item. Specifically, the ah_attr structure holds a reference to the GID table entry, and when the work is canceled before execution, this reference is never released.

The fix ensures that ah_attr is properly destroyed after canceling the work, with the implementation being safe to call even if the attribute was already destroyed through normal execution paths.

Attack Vector

This vulnerability has an unknown attack vector based on the available data. The issue is primarily a resource management bug that could be triggered through normal RDMA operations or potentially exploited by:

  • Repeatedly creating and rapidly destroying multicast connections
  • Timing attacks that increase the likelihood of hitting the race condition between CM ID destruction and work queue processing
  • Local users with access to RDMA devices exhausting kernel resources through repeated exploitation

The vulnerability manifests in the RDMA CM subsystem's multicast handling code. The fix involves adding explicit cleanup of ah_attr after cancel_work_sync() to ensure the GID table reference is properly released regardless of whether the work item executed. See the kernel stable commits for detailed technical implementation.

Detection Methods for CVE-2025-71084

Indicators of Compromise

  • Kernel warning messages containing "GID entry ref leak" in system logs
  • Warnings referencing release_gid_table or gid_table_release_one functions in drivers/infiniband/core/cache.c
  • Increasing GID table reference counts that are not released over time
  • System instability in RDMA-enabled systems, particularly those using multicast functionality

Detection Strategies

  • Monitor kernel logs (dmesg, /var/log/kern.log) for RDMA-related warnings and GID leak messages
  • Implement SentinelOne Singularity Platform's kernel integrity monitoring to detect anomalous kernel behavior patterns
  • Use kernel tracing tools (ftrace, perf) to monitor cancel_work_sync and gid_table_release_one function interactions
  • Configure alerting on WARNING entries from the InfiniBand core subsystem

Monitoring Recommendations

  • Enable comprehensive kernel logging on systems with RDMA/InfiniBand hardware
  • Deploy SentinelOne agents with kernel-level visibility for real-time detection of exploitation attempts
  • Monitor system resource utilization for unexpected memory growth in kernel space
  • Track InfiniBand device statistics for anomalous reference count patterns

How to Mitigate CVE-2025-71084

Immediate Actions Required

  • Apply the latest kernel updates from your Linux distribution that include the RDMA/CM fix
  • If immediate patching is not possible, consider temporarily disabling RDMA multicast functionality on critical systems
  • Monitor affected systems for signs of resource exhaustion or kernel warnings
  • Review system logs for any existing occurrences of GID table reference leaks

Patch Information

The vulnerability has been addressed in multiple kernel stable branches. The following commits contain the fix:

  • Commit c0acdee513239e1d6e1b490f56be0e6837dfd162
  • Commit ab668a58c4a2ccb6d54add7a76f2f955d15d0196
  • Commit 5cb34bb5fd726491b809efbeb5cfd63ae5bf9cf3
  • Commit 57f3cb6c84159d12ba343574df2115fb18dd83ca
  • Commit 3ba6d01c4b3c584264dc733c6a2ecc5bbc8e0bb5

System administrators should update to a kernel version that includes one of these commits or apply the patch to their current kernel.

Workarounds

  • Limit RDMA multicast functionality to trusted users and applications until patching is complete
  • Implement resource monitoring and automatic system restart procedures if GID leaks are detected
  • Consider using network namespaces to isolate RDMA-dependent applications
  • Apply access controls to restrict access to InfiniBand devices (/dev/infiniband/*)
bash
# Check current kernel version
uname -r

# Update kernel on Debian/Ubuntu systems
sudo apt update && sudo apt upgrade linux-image-$(uname -r)

# Update kernel on RHEL/CentOS systems
sudo yum update kernel

# Verify RDMA module status
lsmod | grep rdma

# Monitor for GID leak warnings
dmesg | grep -i "GID entry ref leak"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel Stable Commit Update

  • Kernel Stable Commit Update

  • Kernel Stable Commit Update

  • Kernel Stable Commit Update

  • Kernel Stable Commit Update
  • Related CVEs
  • CVE-2026-31439: Linux Kernel XDMA Error Handling Flaw

  • CVE-2026-31441: Linux Kernel Memory Leak Vulnerability

  • CVE-2026-31434: Linux Kernel Memory Leak Vulnerability

  • CVE-2026-31435: Linux Kernel Read Abandonment Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English