{
  "threat_severity" : "Low",
  "public_date" : "2025-03-06T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: RDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\"",
    "id" : "2350400",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2350400"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-99",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nRDMA/rxe: Fix the warning \"__rxe_cleanup+0x12c/0x170 [rdma_rxe]\"\nThe Call Trace is as below:\n\"\n<TASK>\n? show_regs.cold+0x1a/0x1f\n? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n? __warn+0x84/0xd0\n? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n? report_bug+0x105/0x180\n? handle_bug+0x46/0x80\n? exc_invalid_op+0x19/0x70\n? asm_exc_invalid_op+0x1b/0x20\n? __rxe_cleanup+0x12c/0x170 [rdma_rxe]\n? __rxe_cleanup+0x124/0x170 [rdma_rxe]\nrxe_destroy_qp.cold+0x24/0x29 [rdma_rxe]\nib_destroy_qp_user+0x118/0x190 [ib_core]\nrdma_destroy_qp.cold+0x43/0x5e [rdma_cm]\nrtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core]\nrtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server]\nprocess_one_work+0x21d/0x3f0\nworker_thread+0x4a/0x3c0\n? process_one_work+0x3f0/0x3f0\nkthread+0xf0/0x120\n? kthread_complete_and_exit+0x20/0x20\nret_from_fork+0x22/0x30\n</TASK>\n\"\nWhen too many rdma resources are allocated, rxe needs more time to\nhandle these rdma resources. Sometimes with the current timeout, rxe\ncan not release the rdma resources correctly.\nCompared with other rdma drivers, a bigger timeout is used." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-21829\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-21829\nhttps://lore.kernel.org/linux-cve-announce/2025030611-CVE-2025-21829-50f9@gregkh/T" ],
  "name" : "CVE-2025-21829",
  "csaw" : false
}