CVE-2025-40164

In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix using smp_processor_id() in preemptible code warnings Syzbot reported the following warning: BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879 caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331 CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary) Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120 check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49 usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331 usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708 usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417 __dev_set_mtu net/core/dev.c:9443 [inline] netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496 netif_set_mtu+0xb0/0x160 net/core/dev.c:9520 dev_set_mtu+0xae/0x170 net/core/dev_api.c:247 dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572 dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821 sock_do_ioctl+0x19d/0x280 net/socket.c:1204 sock_ioctl+0x42f/0x6a0 net/socket.c:1311 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:906 [inline] __se_sys_ioctl fs/ioctl.c:892 [inline] __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f For historical and portability reasons, the netif_rx() is usually run in the softirq or interrupt context, this commit therefore add local_bh_disable/enable() protection in the usbnet_resume_rx().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:*

History

26 Feb 2026, 15:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255 - () https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255 - Patch
References () https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7 - () https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7 - Patch
References () https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185 - () https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185 - Patch
References () https://git.kernel.org/stable/c/65d04291adf7c59338f87aab9c6fe0bfa9993e64 - () https://git.kernel.org/stable/c/65d04291adf7c59338f87aab9c6fe0bfa9993e64 - Patch
References () https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb - () https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb - Patch
References () https://git.kernel.org/stable/c/f45fffae5e2549bd0a4670cc52a15ad54c9f121e - () https://git.kernel.org/stable/c/f45fffae5e2549bd0a4670cc52a15ad54c9f121e - Patch

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/65d04291adf7c59338f87aab9c6fe0bfa9993e64 -
  • () https://git.kernel.org/stable/c/f45fffae5e2549bd0a4670cc52a15ad54c9f121e -

30 Jan 2026, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7 -

08 Jan 2026, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb -

12 Nov 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-12 11:15

Updated : 2026-02-26 15:52


NVD link : CVE-2025-40164

Mitre link : CVE-2025-40164

CVE.ORG link : CVE-2025-40164


JSON object : View

Products Affected

linux

  • linux_kernel