In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix using smp_processor_id() in preemptible code warnings
Syzbot reported the following warning:
BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879
caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49
usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708
usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417
__dev_set_mtu net/core/dev.c:9443 [inline]
netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496
netif_set_mtu+0xb0/0x160 net/core/dev.c:9520
dev_set_mtu+0xae/0x170 net/core/dev_api.c:247
dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572
dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821
sock_do_ioctl+0x19d/0x280 net/socket.c:1204
sock_ioctl+0x42f/0x6a0 net/socket.c:1311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:906 [inline]
__se_sys_ioctl fs/ioctl.c:892 [inline]
__x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
For historical and portability reasons, the netif_rx() is usually
run in the softirq or interrupt context, this commit therefore add
local_bh_disable/enable() protection in the usbnet_resume_rx().
References
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 15:52
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.18:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:4.7:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/0134c7bff14bd50314a4f92b182850ddfc38e255 - Patch | |
| References | () https://git.kernel.org/stable/c/17fbad93879e87a334062882b45fa727ba1b3dd7 - Patch | |
| References | () https://git.kernel.org/stable/c/327cd4b68b4398b6c24f10eb2b2533ffbfc10185 - Patch | |
| References | () https://git.kernel.org/stable/c/65d04291adf7c59338f87aab9c6fe0bfa9993e64 - Patch | |
| References | () https://git.kernel.org/stable/c/d1944bab8e0c1511f0cbf364aa06547735bb0ddb - Patch | |
| References | () https://git.kernel.org/stable/c/f45fffae5e2549bd0a4670cc52a15ad54c9f121e - Patch |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Jan 2026, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Jan 2026, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Nov 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-12 11:15
Updated : 2026-02-26 15:52
NVD link : CVE-2025-40164
Mitre link : CVE-2025-40164
CVE.ORG link : CVE-2025-40164
JSON object : View
Products Affected
linux
- linux_kernel
CWE
