CVE-2025-71091
Gravedad CVSS v3.1:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
13/01/2026
Última modificación:
25/03/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
team: fix check for port enabled in team_queue_override_port_prio_changed()<br />
<br />
There has been a syzkaller bug reported recently with the following<br />
trace:<br />
<br />
list_del corruption, ffff888058bea080->prev is LIST_POISON2 (dead000000000122)<br />
------------[ cut here ]------------<br />
kernel BUG at lib/list_debug.c:59!<br />
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI<br />
CPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)<br />
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014<br />
RIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59<br />
Code: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff<br />
RSP: 0018:ffffc9000d49f370 EFLAGS: 00010286<br />
RAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000<br />
RDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005<br />
RBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000<br />
R10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230<br />
R13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480<br />
FS: 00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0<br />
Call Trace:<br />
<br />
__list_del_entry_valid include/linux/list.h:132 [inline]<br />
__list_del_entry include/linux/list.h:223 [inline]<br />
list_del_rcu include/linux/rculist.h:178 [inline]<br />
__team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]<br />
__team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]<br />
team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]<br />
team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534<br />
team_option_set drivers/net/team/team_core.c:376 [inline]<br />
team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653<br />
genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115<br />
genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]<br />
genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210<br />
netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552<br />
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]<br />
netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346<br />
netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896<br />
sock_sendmsg_nosec net/socket.c:727 [inline]<br />
__sock_sendmsg net/socket.c:742 [inline]<br />
____sys_sendmsg+0xa98/0xc70 net/socket.c:2630<br />
___sys_sendmsg+0x134/0x1d0 net/socket.c:2684<br />
__sys_sendmsg+0x16d/0x220 net/socket.c:2716<br />
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
<br />
The problem is in this flow:<br />
1) Port is enabled, queue_id != 0, in qom_list<br />
2) Port gets disabled<br />
-> team_port_disable()<br />
-> team_queue_override_port_del()<br />
-> del (removed from list)<br />
3) Port is disabled, queue_id != 0, not in any list<br />
4) Priority changes<br />
-> team_queue_override_port_prio_changed()<br />
-> checks: port disabled && queue_id != 0<br />
-> calls del - hits the BUG as it is removed already<br />
<br />
To fix this, change the check in team_queue_override_port_prio_changed()<br />
so it returns early if port is not enabled.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.11.1 (incluyendo) | 5.10.248 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.198 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 6.1.160 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.120 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.64 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.18.4 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:3.11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/107d245f84cb4f55f597d31eda34b42a2b7d6952
- https://git.kernel.org/stable/c/25029e813c4aae5fcf7118e8dd5c56e382b9a1a3
- https://git.kernel.org/stable/c/53a727a8bfd78c739e130a781192d0f6f8e03d39
- https://git.kernel.org/stable/c/6bfb62b6010a16112dcae52f490e5e0e6abe12a3
- https://git.kernel.org/stable/c/932ac51d9953eaf77a1252f79b656d4ca86163c6
- https://git.kernel.org/stable/c/b71187648ef2349254673d0523fdf96d1fe3d758
- https://git.kernel.org/stable/c/f820e438b8ec2a8354e70e75145f05fe45500d97



