CVE-2025-21829

In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" The Call Trace is as below: " <TASK> ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+0x84/0xd0 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? report_bug+0x105/0x180 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x19/0x70 ? asm_exc_invalid_op+0x1b/0x20 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __rxe_cleanup+0x124/0x170 [rdma_rxe] rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe] ib_destroy_qp_user+0x118/0x190 [ib_core] rdma_destroy_qp.cold+0x43/0x5e [rdma_cm] rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core] rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server] process_one_work+0x21d/0x3f0 worker_thread+0x4a/0x3c0 ? process_one_work+0x3f0/0x3f0 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 </TASK> " When too many rdma resources are allocated, rxe needs more time to handle these rdma resources. Sometimes with the current timeout, rxe can not release the rdma resources correctly. Compared with other rdma drivers, a bigger timeout is used.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

29 Oct 2025, 21:04

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/45e567800492088bc52c9abac35524b4d332a8f8 - () https://git.kernel.org/stable/c/45e567800492088bc52c9abac35524b4d332a8f8 - Patch
References () https://git.kernel.org/stable/c/720653309dd31c8a927ef5d87964578ad544980f - () https://git.kernel.org/stable/c/720653309dd31c8a927ef5d87964578ad544980f - Patch
References () https://git.kernel.org/stable/c/7a2de8126ed3801f2396720e10a03cd546a3cea1 - () https://git.kernel.org/stable/c/7a2de8126ed3801f2396720e10a03cd546a3cea1 - Patch
References () https://git.kernel.org/stable/c/a7d15eaecf0d6e13226db629ae2401c8c02683e5 - () https://git.kernel.org/stable/c/a7d15eaecf0d6e13226db629ae2401c8c02683e5 - Patch
References () https://git.kernel.org/stable/c/edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1 - () https://git.kernel.org/stable/c/edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/rxe: Se corrige la advertencia "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" El seguimiento de llamadas es el siguiente: " ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+0x84/0xd0 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? report_bug+0x105/0x180 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x19/0x70 ? asm_exc_invalid_op+0x1b/0x20 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __rxe_cleanup+0x124/0x170 [rdma_rxe] rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe] ib_destroy_qp_user+0x118/0x190 [ib_core] rdma_destroy_qp.cold+0x43/0x5e [rdma_cm] rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core] rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server] process_one_work+0x21d/0x3f0 worker_thread+0x4a/0x3c0 ? process_one_work+0x3f0/0x3f0 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 "Cuando se asignan demasiados recursos rdma, rxe necesita más tiempo para gestionar estos recursos rdma. A veces, con el tiempo de espera actual, rxe no puede liberar los recursos rdma correctamente. En comparación con otros controladores rdma, se utiliza un tiempo de espera mayor.
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

06 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-06 17:15

Updated : 2025-10-29 21:04


NVD link : CVE-2025-21829

Mitre link : CVE-2025-21829

CVE.ORG link : CVE-2025-21829


JSON object : View

Products Affected

linux

  • linux_kernel