[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025041603-CVE-2025-22050-2aee@gregkh>
Date: Wed, 16 Apr 2025 16:12:21 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2025-22050: usbnet:fix NPE during rx_complete
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
usbnet:fix NPE during rx_complete
Missing usbnet_going_away Check in Critical Path.
The usb_submit_urb function lacks a usbnet_going_away
validation, whereas __usbnet_queue_skb includes this check.
This inconsistency creates a race condition where:
A URB request may succeed, but the corresponding SKB data
fails to be queued.
Subsequent processes:
(e.g., rx_complete → defer_bh → __skb_unlink(skb, list))
attempt to access skb->next, triggering a NULL pointer
dereference (Kernel Panic).
The Linux kernel CVE team has assigned CVE-2025-22050 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.15.168 with commit b80aacfea6e8d6ed6e430aa13922d6ccf044415a and fixed in 5.15.180 with commit 95789c2f94fd29dce8759f9766baa333f749287c
Issue introduced in 6.1.113 with commit 869caa8de8cb94514df704ccbe0b024fda4b9398 and fixed in 6.1.134 with commit 0f10f83acfd619e13c64d6705908dfd792f19544
Issue introduced in 6.6.54 with commit 1e44ee6cdd123d6cfe78b4a94e1572e23bbb58ce and fixed in 6.6.87 with commit acacd48a37b52fc95f621765762c04152b58d642
Issue introduced in 6.12 with commit 04e906839a053f092ef53f4fb2d610983412b904 and fixed in 6.12.23 with commit d689645cd1594ea1d13cb0c404f8ad1011353e0e
Issue introduced in 6.12 with commit 04e906839a053f092ef53f4fb2d610983412b904 and fixed in 6.13.11 with commit 0c30988588b28393e3e8873d5654f910e86391ba
Issue introduced in 6.12 with commit 04e906839a053f092ef53f4fb2d610983412b904 and fixed in 6.14.2 with commit fd9ee3f0d6a53844f65efde581c91bbb0ff749ac
Issue introduced in 6.12 with commit 04e906839a053f092ef53f4fb2d610983412b904 and fixed in 6.15-rc1 with commit 51de3600093429e3b712e5f091d767babc5dd6df
Issue introduced in 6.10.13 with commit ca124236cd14e61610f56df9a8f81376a1ffe660
Issue introduced in 6.11.2 with commit 54671d731f4977fb3c0c26f2840655b5204e4437
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-22050
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/net/usb/usbnet.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/95789c2f94fd29dce8759f9766baa333f749287c
https://git.kernel.org/stable/c/0f10f83acfd619e13c64d6705908dfd792f19544
https://git.kernel.org/stable/c/acacd48a37b52fc95f621765762c04152b58d642
https://git.kernel.org/stable/c/d689645cd1594ea1d13cb0c404f8ad1011353e0e
https://git.kernel.org/stable/c/0c30988588b28393e3e8873d5654f910e86391ba
https://git.kernel.org/stable/c/fd9ee3f0d6a53844f65efde581c91bbb0ff749ac
https://git.kernel.org/stable/c/51de3600093429e3b712e5f091d767babc5dd6df
Powered by blists - more mailing lists