We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: usbnet:fix NPE during rx_complete Missing usbnet_going_away Check in Critical Path. The usb_submit_urb function lacks a usbnet_going_away validation, whereas __usbnet_queue_skb includes this check. This inconsistency creates a race condition where: A URB request may succeed, but the corresponding SKB data fails to be queued. Subsequent processes: (e.g., rx_complete → defer_bh → __skb_unlink(skb, list)) attempt to access skb->next, triggering a NULL pointer dereference (Kernel Panic).
Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linuxgit.kernel.org/...c/95789c2f94fd29dce8759f9766baa333f749287c
git.kernel.org/...c/0f10f83acfd619e13c64d6705908dfd792f19544
git.kernel.org/...c/acacd48a37b52fc95f621765762c04152b58d642
git.kernel.org/...c/d689645cd1594ea1d13cb0c404f8ad1011353e0e
git.kernel.org/...c/0c30988588b28393e3e8873d5654f910e86391ba
git.kernel.org/...c/fd9ee3f0d6a53844f65efde581c91bbb0ff749ac
git.kernel.org/...c/51de3600093429e3b712e5f091d767babc5dd6df
Support options