In the Linux kernel, the following vulnerability has been resolved:
usbnet:fix NPE during rx_complete
Missing usbnet_going_away Check in Critical Path.
The usb_submit_urb function lacks a usbnet_going_away
validation, whereas __usbnet_queue_skb includes this check.
This inconsistency creates a race condition where:
A URB request may succeed, but the corresponding SKB data
fails to be queued.
Subsequent processes:
(e.g., rx_complete → defer_bh → __skb_unlink(skb, list))
attempt to access skb->next, triggering a NULL pointer
dereference (Kernel Panic).
Metrics
Affected Vendors & Products
References
History
Fri, 25 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-476 |
Thu, 17 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 16 Apr 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: usbnet:fix NPE during rx_complete Missing usbnet_going_away Check in Critical Path. The usb_submit_urb function lacks a usbnet_going_away validation, whereas __usbnet_queue_skb includes this check. This inconsistency creates a race condition where: A URB request may succeed, but the corresponding SKB data fails to be queued. Subsequent processes: (e.g., rx_complete → defer_bh → __skb_unlink(skb, list)) attempt to access skb->next, triggering a NULL pointer dereference (Kernel Panic). | |
Title | usbnet:fix NPE during rx_complete | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-04-16T14:12:08.954Z
Updated: 2025-05-04T13:06:57.080Z
Reserved: 2024-12-29T08:45:45.811Z
Link: CVE-2025-22050

No data.

Status : Awaiting Analysis
Published: 2025-04-16T15:15:58.437
Modified: 2025-04-17T20:22:16.240
Link: CVE-2025-22050
