In the Linux kernel, the following vulnerability has been resolved:
vmxnet3: unregister xdp rxq info in the reset path
vmxnet3 does not unregister xdp rxq info in the
vmxnet3_reset_work() code path as vmxnet3_rq_destroy()
is not invoked in this code path. So, we get below message with a
backtrace.
Missing unregister, handled but fix driver
WARNING: CPU:48 PID: 500 at net/core/xdp.c:182
__xdp_rxq_info_reg+0x93/0xf0
This patch fixes the problem by moving the unregister
code of XDP from vmxnet3_rq_destroy() to vmxnet3_rq_cleanup().
Metrics
Affected Vendors & Products
References
History
Fri, 25 Apr 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-459 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 17 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 16 Apr 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: vmxnet3: unregister xdp rxq info in the reset path vmxnet3 does not unregister xdp rxq info in the vmxnet3_reset_work() code path as vmxnet3_rq_destroy() is not invoked in this code path. So, we get below message with a backtrace. Missing unregister, handled but fix driver WARNING: CPU:48 PID: 500 at net/core/xdp.c:182 __xdp_rxq_info_reg+0x93/0xf0 This patch fixes the problem by moving the unregister code of XDP from vmxnet3_rq_destroy() to vmxnet3_rq_cleanup(). | |
Title | vmxnet3: unregister xdp rxq info in the reset path | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-04-16T14:12:54.461Z
Updated: 2025-04-16T14:12:54.461Z
Reserved: 2024-12-29T08:45:45.820Z
Link: CVE-2025-22106

No data.

Status : Awaiting Analysis
Published: 2025-04-16T15:16:04.913
Modified: 2025-04-17T20:22:16.240
Link: CVE-2025-22106
