| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet:fix NPE during rx_complete\n\nMissing usbnet_going_away Check in Critical Path.\nThe usb_submit_urb function lacks a usbnet_going_away\nvalidation, whereas __usbnet_queue_skb includes this check.\n\nThis inconsistency creates a race condition where:\nA URB request may succeed, but the corresponding SKB data\nfails to be queued.\n\nSubsequent processes:\n(e.g., rx_complete → defer_bh → __skb_unlink(skb, list))\nattempt to access skb->next, triggering a NULL pointer\ndereference (Kernel Panic)." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/usb/usbnet.c" |
| ], |
| "versions": [ |
| { |
| "version": "b80aacfea6e8d6ed6e430aa13922d6ccf044415a", |
| "lessThan": "95789c2f94fd29dce8759f9766baa333f749287c", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "869caa8de8cb94514df704ccbe0b024fda4b9398", |
| "lessThan": "0f10f83acfd619e13c64d6705908dfd792f19544", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "1e44ee6cdd123d6cfe78b4a94e1572e23bbb58ce", |
| "lessThan": "acacd48a37b52fc95f621765762c04152b58d642", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "04e906839a053f092ef53f4fb2d610983412b904", |
| "lessThan": "d689645cd1594ea1d13cb0c404f8ad1011353e0e", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "04e906839a053f092ef53f4fb2d610983412b904", |
| "lessThan": "0c30988588b28393e3e8873d5654f910e86391ba", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "04e906839a053f092ef53f4fb2d610983412b904", |
| "lessThan": "fd9ee3f0d6a53844f65efde581c91bbb0ff749ac", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "04e906839a053f092ef53f4fb2d610983412b904", |
| "lessThan": "51de3600093429e3b712e5f091d767babc5dd6df", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "ca124236cd14e61610f56df9a8f81376a1ffe660", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "54671d731f4977fb3c0c26f2840655b5204e4437", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "drivers/net/usb/usbnet.c" |
| ], |
| "versions": [ |
| { |
| "version": "6.12", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "6.12", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.180", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.134", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.87", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.12.23", |
| "lessThanOrEqual": "6.12.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.13.11", |
| "lessThanOrEqual": "6.13.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.14.2", |
| "lessThanOrEqual": "6.14.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.15", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.15.168", |
| "versionEndExcluding": "5.15.180" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.1.113", |
| "versionEndExcluding": "6.1.134" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.6.54", |
| "versionEndExcluding": "6.6.87" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.12", |
| "versionEndExcluding": "6.12.23" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.12", |
| "versionEndExcluding": "6.13.11" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.12", |
| "versionEndExcluding": "6.14.2" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.12", |
| "versionEndExcluding": "6.15" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.10.13" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "6.11.2" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/95789c2f94fd29dce8759f9766baa333f749287c" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0f10f83acfd619e13c64d6705908dfd792f19544" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/acacd48a37b52fc95f621765762c04152b58d642" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/d689645cd1594ea1d13cb0c404f8ad1011353e0e" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/0c30988588b28393e3e8873d5654f910e86391ba" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/fd9ee3f0d6a53844f65efde581c91bbb0ff749ac" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/51de3600093429e3b712e5f091d767babc5dd6df" |
| } |
| ], |
| "title": "usbnet:fix NPE during rx_complete", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2025-22050", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |