In the Linux kernel, the following vulnerability has been resolved:
vmxnet3: unregister xdp rxq info in the reset path
vmxnet3 does not unregister xdp rxq info in the
vmxnet3_reset_work() code path as vmxnet3_rq_destroy()
is not invoked in this code path. So, we get below message with a
backtrace.
Missing unregister, handled but fix driver
WARNING: CPU:48 PID: 500 at net/core/xdp.c:182
__xdp_rxq_info_reg+0x93/0xf0
This patch fixes the problem by moving the unregister
code of XDP from vmxnet3_rq_destroy() to vmxnet3_rq_cleanup().
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-16 15:16
Updated : 2025-11-03 18:42
NVD link : CVE-2025-22106
Mitre link : CVE-2025-22106
CVE.ORG link : CVE-2025-22106
JSON object : View
Products Affected
linux
- linux_kernel
CWE
