CVE-2025-21805
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2025
Last modified:
28/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/rtrs: Add missing deinit() call<br />
<br />
A warning is triggered when repeatedly connecting and disconnecting the<br />
rnbd:<br />
list_add corruption. prev->next should be next (ffff88800b13e480), but was ffff88801ecd1338. (prev=ffff88801ecd1340).<br />
WARNING: CPU: 1 PID: 36562 at lib/list_debug.c:32 __list_add_valid_or_report+0x7f/0xa0<br />
Workqueue: ib_cm cm_work_handler [ib_cm]<br />
RIP: 0010:__list_add_valid_or_report+0x7f/0xa0<br />
? __list_add_valid_or_report+0x7f/0xa0<br />
ib_register_event_handler+0x65/0x93 [ib_core]<br />
rtrs_srv_ib_dev_init+0x29/0x30 [rtrs_server]<br />
rtrs_ib_dev_find_or_add+0x124/0x1d0 [rtrs_core]<br />
__alloc_path+0x46c/0x680 [rtrs_server]<br />
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]<br />
? rcu_is_watching+0xd/0x40<br />
? __mutex_lock+0x312/0xcf0<br />
? get_or_create_srv+0xad/0x310 [rtrs_server]<br />
? rtrs_rdma_connect+0xa6/0x2d0 [rtrs_server]<br />
rtrs_rdma_connect+0x23c/0x2d0 [rtrs_server]<br />
? __lock_release+0x1b1/0x2d0<br />
cma_cm_event_handler+0x4a/0x1a0 [rdma_cm]<br />
cma_ib_req_handler+0x3a0/0x7e0 [rdma_cm]<br />
cm_process_work+0x28/0x1a0 [ib_cm]<br />
? _raw_spin_unlock_irq+0x2f/0x50<br />
cm_req_handler+0x618/0xa60 [ib_cm]<br />
cm_work_handler+0x71/0x520 [ib_cm]<br />
<br />
Commit 667db86bcbe8 ("RDMA/rtrs: Register ib event handler") introduced a<br />
new element .deinit but never used it at all. Fix it by invoking the<br />
`deinit()` to appropriately unregister the IB event handler.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



