{"id":"CVE-2024-44995","summary":"net: hns3: fix a deadlock problem when config TC during resetting","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix a deadlock problem when config TC during resetting\n\nWhen config TC during the reset process, may cause a deadlock, the flow is\nas below:\n                             pf reset start\n                                 │\n                                 ▼\n                              ......\nsetup tc                         │\n    │                            ▼\n    ▼                      DOWN: napi_disable()\nnapi_disable()(skip)             │\n    │                            │\n    ▼                            ▼\n  ......                      ......\n    │                            │\n    ▼                            │\nnapi_enable()                    │\n                                 ▼\n                           UINIT: netif_napi_del()\n                                 │\n                                 ▼\n                              ......\n                                 │\n                                 ▼\n                           INIT: netif_napi_add()\n                                 │\n                                 ▼\n                              ......                 global reset start\n                                 │                      │\n                                 ▼                      ▼\n                           UP: napi_enable()(skip)    ......\n                                 │                      │\n                                 ▼                      ▼\n                              ......                 napi_disable()\n\nIn reset process, the driver will DOWN the port and then UINIT, in this\ncase, the setup tc process will UP the port before UINIT, so cause the\nproblem. Adds a DOWN process in UINIT to fix it.","modified":"2026-04-16T04:38:00.363191320Z","published":"2024-09-04T19:54:40.878Z","related":["SUSE-SU-2024:4314-1","SUSE-SU-2024:4315-1","SUSE-SU-2024:4316-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4367-1","SUSE-SU-2024:4376-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0035-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44995.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/195918217448a6bb7f929d6a2ffffce9f1ece1cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67492d4d105c0a6321b00c393eec96b9a7a97a16"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6ae2b7d63cd056f363045eb65409143e16f23ae8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be5e816d00a506719e9dbb1a9c861c5ced30a109"},{"type":"WEB","url":"https://git.kernel.org/stable/c/de37408d5c26fc4a296a28a0c96dcb814219bfa1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fa1d4de7265c370e673583ac8d1bd17d21826cd9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fc250eca15bde34c4c8f806b9d88f55bd56a992c"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/44xxx/CVE-2024-44995.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-44995"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"bb6b94a896d4dd4dcdeccca87c3fd22521c652c0"},{"fixed":"67492d4d105c0a6321b00c393eec96b9a7a97a16"},{"fixed":"fc250eca15bde34c4c8f806b9d88f55bd56a992c"},{"fixed":"195918217448a6bb7f929d6a2ffffce9f1ece1cc"},{"fixed":"6ae2b7d63cd056f363045eb65409143e16f23ae8"},{"fixed":"fa1d4de7265c370e673583ac8d1bd17d21826cd9"},{"fixed":"de37408d5c26fc4a296a28a0c96dcb814219bfa1"},{"fixed":"be5e816d00a506719e9dbb1a9c861c5ced30a109"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-44995.json"}}],"schema_version":"1.7.5"}