๐Ÿ” CVE Alert

CVE-2024-44995

UNKNOWN 0.0

net: hns3: fix a deadlock problem when config TC during resetting

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix a deadlock problem when config TC during resetting When config TC during the reset process, may cause a deadlock, the flow is as below: pf reset start โ”‚ โ–ผ ...... setup tc โ”‚ โ”‚ โ–ผ โ–ผ DOWN: napi_disable() napi_disable()(skip) โ”‚ โ”‚ โ”‚ โ–ผ โ–ผ ...... ...... โ”‚ โ”‚ โ–ผ โ”‚ napi_enable() โ”‚ โ–ผ UINIT: netif_napi_del() โ”‚ โ–ผ ...... โ”‚ โ–ผ INIT: netif_napi_add() โ”‚ โ–ผ ...... global reset start โ”‚ โ”‚ โ–ผ โ–ผ UP: napi_enable()(skip) ...... โ”‚ โ”‚ โ–ผ โ–ผ ...... napi_disable() In reset process, the driver will DOWN the port and then UINIT, in this case, the setup tc process will UP the port before UINIT, so cause the problem. Adds a DOWN process in UINIT to fix it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < 67492d4d105c0a6321b00c393eec96b9a7a97a16 bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < fc250eca15bde34c4c8f806b9d88f55bd56a992c bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < 195918217448a6bb7f929d6a2ffffce9f1ece1cc bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < 6ae2b7d63cd056f363045eb65409143e16f23ae8 bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < fa1d4de7265c370e673583ac8d1bd17d21826cd9 bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < de37408d5c26fc4a296a28a0c96dcb814219bfa1 bb6b94a896d4dd4dcdeccca87c3fd22521c652c0 < be5e816d00a506719e9dbb1a9c861c5ced30a109
Linux / Linux
4.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/67492d4d105c0a6321b00c393eec96b9a7a97a16 git.kernel.org: https://git.kernel.org/stable/c/fc250eca15bde34c4c8f806b9d88f55bd56a992c git.kernel.org: https://git.kernel.org/stable/c/195918217448a6bb7f929d6a2ffffce9f1ece1cc git.kernel.org: https://git.kernel.org/stable/c/6ae2b7d63cd056f363045eb65409143e16f23ae8 git.kernel.org: https://git.kernel.org/stable/c/fa1d4de7265c370e673583ac8d1bd17d21826cd9 git.kernel.org: https://git.kernel.org/stable/c/de37408d5c26fc4a296a28a0c96dcb814219bfa1 git.kernel.org: https://git.kernel.org/stable/c/be5e816d00a506719e9dbb1a9c861c5ced30a109 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html