In the Linux kernel, the following vulnerability has been resolved:
usbnet:fix NPE during rx_complete
Missing usbnet_going_away Check in Critical Path.
The usb_submit_urb function lacks a usbnet_going_away
validation, whereas __usbnet_queue_skb includes this check.
This inconsistency creates a race condition where:
A URB request may succeed, but the corresponding SKB data
fails to be queued.
Subsequent processes:
(e.g., rx_complete → defer_bh → __skb_unlink(skb, list))
attempt to access skb->next, triggering a NULL pointer
dereference (Kernel Panic).
References
Configurations
Configuration 1 (hide)
|
History
31 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| Summary |
|
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/0c30988588b28393e3e8873d5654f910e86391ba - Patch | |
| References | () https://git.kernel.org/stable/c/0f10f83acfd619e13c64d6705908dfd792f19544 - Patch | |
| References | () https://git.kernel.org/stable/c/51de3600093429e3b712e5f091d767babc5dd6df - Patch | |
| References | () https://git.kernel.org/stable/c/95789c2f94fd29dce8759f9766baa333f749287c - Patch | |
| References | () https://git.kernel.org/stable/c/acacd48a37b52fc95f621765762c04152b58d642 - Patch | |
| References | () https://git.kernel.org/stable/c/d689645cd1594ea1d13cb0c404f8ad1011353e0e - Patch | |
| References | () https://git.kernel.org/stable/c/fd9ee3f0d6a53844f65efde581c91bbb0ff749ac - Patch |
16 Apr 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-16 15:15
Updated : 2025-10-31 20:19
NVD link : CVE-2025-22050
Mitre link : CVE-2025-22050
CVE.ORG link : CVE-2025-22050
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
