Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21829— RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"

EPSS 0.01% · P3

Affected Version Matrix 12

VendorProductVersion RangeStatus
LinuxLinux215d0a755e1bcd92cbe6a71a21194ce7c82ec106< 720653309dd31c8a927ef5d87964578ad544980faffected
215d0a755e1bcd92cbe6a71a21194ce7c82ec106< 45e567800492088bc52c9abac35524b4d332a8f8affected
215d0a755e1bcd92cbe6a71a21194ce7c82ec106< 7a2de8126ed3801f2396720e10a03cd546a3cea1affected
215d0a755e1bcd92cbe6a71a21194ce7c82ec106< a7d15eaecf0d6e13226db629ae2401c8c02683e5affected
215d0a755e1bcd92cbe6a71a21194ce7c82ec106< edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1affected
6.0affected
< 6.0unaffected
6.1.129≤ 6.1.*unaffected
… +4 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-21829

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" The Call Trace is as below: " <TASK> ? show_regs.cold+0x1a/0x1f ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __warn+0x84/0xd0 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? report_bug+0x105/0x180 ? handle_bug+0x46/0x80 ? exc_invalid_op+0x19/0x70 ? asm_exc_invalid_op+0x1b/0x20 ? __rxe_cleanup+0x12c/0x170 [rdma_rxe] ? __rxe_cleanup+0x124/0x170 [rdma_rxe] rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe] ib_destroy_qp_user+0x118/0x190 [ib_core] rdma_destroy_qp.cold+0x43/0x5e [rdma_cm] rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core] rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server] process_one_work+0x21d/0x3f0 worker_thread+0x4a/0x3c0 ? process_one_work+0x3f0/0x3f0 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 </TASK> " When too many rdma resources are allocated, rxe needs more time to handle these rdma resources. Sometimes with the current timeout, rxe can not release the rdma resources correctly. Compared with other rdma drivers, a bigger timeout is used.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于rxe在清理时可能导致警告。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 215d0a755e1bcd92cbe6a71a21194ce7c82ec106 ~ 720653309dd31c8a927ef5d87964578ad544980f -
LinuxLinux 6.0 -

II. Public POCs for CVE-2025-21829

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-21829

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-03-06 · 46 CVEs total

CVE-2024-58063wifi: rtlwifi: fix memory leaks and invalid access at probe error path
CVE-2024-58060bpf: Reject struct_ops registration that uses module ptr and the module btf_id is missing
CVE-2024-58058ubifs: skip dumping tnc tree when zroot is null
CVE-2024-58055usb: gadget: f_tcm: Don't free command immediately
CVE-2024-58053rxrpc: Fix handling of received connection abort
CVE-2024-58054staging: media: max96712: fix kernel oops when removing module
CVE-2024-58052drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table
CVE-2024-58051ipmi: ipmb: Add check devm_kasprintf() returned value
CVE-2024-58056remoteproc: core: Fix ida_free call while not allocated
CVE-2024-58062wifi: iwlwifi: mvm: avoid NULL pointer dereference
CVE-2024-58061wifi: mac80211: prohibit deactivating all links
CVE-2024-58064wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap(
CVE-2024-58065clk: mmp: pxa1908-apbc: Fix NULL vs IS_ERR() check
CVE-2024-58066clk: mmp: pxa1908-apbcp: Fix a NULL vs IS_ERR() check
CVE-2024-58067clk: mmp: pxa1908-mpmu: Fix a NULL vs IS_ERR() check
CVE-2024-58069rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
CVE-2024-58068OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
CVE-2024-58070bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
CVE-2024-58071team: prevent adding a device which is already a team device lower
CVE-2024-58072wifi: rtlwifi: remove unused check_buddy_priv

Showing top 20 of 46 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-21829

No comments yet


Leave a comment