{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-21802","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.771Z","datePublished":"2025-02-27T20:00:56.292Z","dateUpdated":"2026-05-11T21:06:49.085Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:06:49.085Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix oops when unload drivers paralleling\n\nWhen unload hclge driver, it tries to disable sriov first for each\nae_dev node from hnae3_ae_dev_list. If user unloads hns3 driver at\nthe time, because it removes all the ae_dev nodes, and it may cause\noops.\n\nBut we can't simply use hnae3_common_lock for this. Because in the\nprocess flow of pci_disable_sriov(), it will trigger the remove flow\nof VF, which will also take hnae3_common_lock.\n\nTo fixes it, introduce a new mutex to protect the unload process."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/hisilicon/hns3/hnae3.c","drivers/net/ethernet/hisilicon/hns3/hnae3.h","drivers/net/ethernet/hisilicon/hns3/hns3_enet.c","drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c","drivers/net/ethernet/hisilicon/hns3/hns3vf/hclgevf_main.c"],"versions":[{"version":"d36b15e3e7b5937cb1f6ac590a85facc3a320642","lessThan":"622d92a67656e5c4d2d6ccac02d688ed995418c6","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"8c640dd3d900cc8988a39c007591f1deee776df4","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"e876522659012ef2e73834a0b9f1cbe3f74d5fad","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"b5a8bc47aa0a4aa8bca5466dfa2d12dbb5b3cd0c","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"82736bb83fb0221319c85c2e9917d0189cd84e1e","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"cafe9a27e22736d4a01b3933e36225f9857c7988","status":"affected","versionType":"git"},{"version":"0dd8a25f355b4df2d41c08df1716340854c7d4c5","lessThan":"92e5995773774a3e70257e9c95ea03518268bea5","status":"affected","versionType":"git"},{"version":"b06ad258e01389ca3ff13bc180f3fcd6a608f1cd","status":"affected","versionType":"git"},{"version":"c4b64011e458aa2b246cd4e42012cfd83d2d9a5c","status":"affected","versionType":"git"},{"version":"9b5a29f0acefa3eb1dbe2fa302b393eeff64d933","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/hisilicon/hns3/hnae3.c","drivers/net/ethernet/hisilicon/hns3/hnae3.h","drivers/net/ethernet/hisilicon/hns3/hns3_enet.c","drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_main.c","drivers/net/ethernet/hisilicon/hns3/hns3vf/hclgevf_main.c"],"versions":[{"version":"5.15","status":"affected"},{"version":"0","lessThan":"5.15","status":"unaffected","versionType":"semver"},{"version":"5.10.235","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.179","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.129","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.76","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.13","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.2","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.76","versionEndExcluding":"5.10.235"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"5.15.179"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.1.129"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.6.76"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.12.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.13.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.214"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.156"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/622d92a67656e5c4d2d6ccac02d688ed995418c6"},{"url":"https://git.kernel.org/stable/c/8c640dd3d900cc8988a39c007591f1deee776df4"},{"url":"https://git.kernel.org/stable/c/e876522659012ef2e73834a0b9f1cbe3f74d5fad"},{"url":"https://git.kernel.org/stable/c/b5a8bc47aa0a4aa8bca5466dfa2d12dbb5b3cd0c"},{"url":"https://git.kernel.org/stable/c/82736bb83fb0221319c85c2e9917d0189cd84e1e"},{"url":"https://git.kernel.org/stable/c/cafe9a27e22736d4a01b3933e36225f9857c7988"},{"url":"https://git.kernel.org/stable/c/92e5995773774a3e70257e9c95ea03518268bea5"}],"title":"net: hns3: fix oops when unload drivers paralleling","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:59:43.044Z"}}]}}