CVE-2025-71091

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2026
Last modified:
25/03/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> team: fix check for port enabled in team_queue_override_port_prio_changed()<br /> <br /> There has been a syzkaller bug reported recently with the following<br /> trace:<br /> <br /> list_del corruption, ffff888058bea080-&gt;prev is LIST_POISON2 (dead000000000122)<br /> ------------[ cut here ]------------<br /> kernel BUG at lib/list_debug.c:59!<br /> Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI<br /> CPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014<br /> RIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59<br /> Code: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff<br /> RSP: 0018:ffffc9000d49f370 EFLAGS: 00010286<br /> RAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000<br /> RDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005<br /> RBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000<br /> R10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230<br /> R13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480<br /> FS: 00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0<br /> Call Trace:<br /> <br /> __list_del_entry_valid include/linux/list.h:132 [inline]<br /> __list_del_entry include/linux/list.h:223 [inline]<br /> list_del_rcu include/linux/rculist.h:178 [inline]<br /> __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]<br /> __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]<br /> team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]<br /> team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534<br /> team_option_set drivers/net/team/team_core.c:376 [inline]<br /> team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653<br /> genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115<br /> genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]<br /> genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210<br /> netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552<br /> genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]<br /> netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346<br /> netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896<br /> sock_sendmsg_nosec net/socket.c:727 [inline]<br /> __sock_sendmsg net/socket.c:742 [inline]<br /> ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630<br /> ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684<br /> __sys_sendmsg+0x16d/0x220 net/socket.c:2716<br /> do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br /> do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> <br /> The problem is in this flow:<br /> 1) Port is enabled, queue_id != 0, in qom_list<br /> 2) Port gets disabled<br /> -&gt; team_port_disable()<br /> -&gt; team_queue_override_port_del()<br /> -&gt; del (removed from list)<br /> 3) Port is disabled, queue_id != 0, not in any list<br /> 4) Priority changes<br /> -&gt; team_queue_override_port_prio_changed()<br /> -&gt; checks: port disabled &amp;&amp; queue_id != 0<br /> -&gt; calls del - hits the BUG as it is removed already<br /> <br /> To fix this, change the check in team_queue_override_port_prio_changed()<br /> so it returns early if port is not enabled.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.11.1 (including) 5.10.248 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.198 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.160 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.120 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.64 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.4 (excluding)
cpe:2.3:o:linux:linux_kernel:3.11:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*