CVE-2025-22106

In the Linux kernel, the following vulnerability has been resolved: vmxnet3: unregister xdp rxq info in the reset path vmxnet3 does not unregister xdp rxq info in the vmxnet3_reset_work() code path as vmxnet3_rq_destroy() is not invoked in this code path. So, we get below message with a backtrace. Missing unregister, handled but fix driver WARNING: CPU:48 PID: 500 at net/core/xdp.c:182 __xdp_rxq_info_reg+0x93/0xf0 This patch fixes the problem by moving the unregister code of XDP from vmxnet3_rq_destroy() to vmxnet3_rq_cleanup().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Nov 2025, 18:42

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0dd765fae295832934bf28e45dd5a355e0891ed4 - () https://git.kernel.org/stable/c/0dd765fae295832934bf28e45dd5a355e0891ed4 - Patch
References () https://git.kernel.org/stable/c/23da4e0bb2a38966d29db0ff90a8fe68fdfa1744 - () https://git.kernel.org/stable/c/23da4e0bb2a38966d29db0ff90a8fe68fdfa1744 - Patch
References () https://git.kernel.org/stable/c/9908541a9e235b7c5e2fbdd59910eaf9c32c3075 - () https://git.kernel.org/stable/c/9908541a9e235b7c5e2fbdd59910eaf9c32c3075 - Patch
References () https://git.kernel.org/stable/c/a6157484bee3385a425d288a69e1eaf03232f5fc - () https://git.kernel.org/stable/c/a6157484bee3385a425d288a69e1eaf03232f5fc - Patch

25 Sep 2025, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/23da4e0bb2a38966d29db0ff90a8fe68fdfa1744 -
  • () https://git.kernel.org/stable/c/a6157484bee3385a425d288a69e1eaf03232f5fc -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vmxnet3: anular el registro de la información de xdp rxq en la ruta de reinicio vmxnet3 no anula el registro de la información de xdp rxq en la ruta de código vmxnet3_reset_work() ya que vmxnet3_rq_destroy() no se invoca en esta ruta de código. Por lo tanto, obtenemos el siguiente mensaje con un backtrace. Falta anulación del registro, gestionada pero corregida el controlador ADVERTENCIA: CPU:48 PID: 500 en net/core/xdp.c:182 __xdp_rxq_info_reg+0x93/0xf0 Este parche corrige el problema moviendo el código de anulación del registro de XDP de vmxnet3_rq_destroy() a vmxnet3_rq_cleanup().

16 Apr 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 15:16

Updated : 2025-11-03 18:42


NVD link : CVE-2025-22106

Mitre link : CVE-2025-22106

CVE.ORG link : CVE-2025-22106


JSON object : View

Products Affected

linux

  • linux_kernel