VulnerAlert



LINUX
18-12-2025 19:11

CVE-2025-38153 Vulnerabilidad documentada

Sin puntuación
Tags
#really
#list
#kernel
#drive
#commit
#add
#linux
#vulnerability
#/.net(.*)core/iU
#.net core
#warning
#problem
#issue
#fix
#errors
#error
#bug
Descripción
In the Linux kernel, following vulnerability has been resolved: net: usb: aqc111: fix error handling of usbnet read calls Syzkaller, courtesy syzbot, identified an (see report [1]) in aqc111 driver, caused by incomplete sanitation usb calls' results. This problem is quite similar to one fixed in commit 920a9fa27e78 ("net: asix: add proper errors"). For instance, usbnet_read_cmd() may fewer than 'size' bytes, even if caller expected full amount, and aqc111_read_cmd() will not check its result properly. As [1] shows, this lead to MAC address aqc111_bind() being only partly initialized, triggering KMSAN warnings. Fix issue verifying that number bytes is as less. [1] Partial syzbot report: BUG: KMSAN: uninit-value is_valid_ether_addr include/linux/etherdevice.h:208 [inline] BUG: usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830 [inline] usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:-1 really_probe+0x4d1/0xd90 drivers/base/dd.c:658 __driver_probe_device+0x268/0x380 drivers/base/dd.c:800 ... Uninit was stored memory at: dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582 __dev_addr_set include/linux/netdevice.h:4874 eth_hw_addr_set include/linux/etherdevice.h:325 aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772 drivers/usb/core/driver.c:396 ... Uninit ether_addr_copy include/linux/etherdevice.h:305 aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713 [inline] ... Local variable buf.i created drivers/net/usb/aqc111.c:656 aqc111_bind+0x221/0x1150 drivers/net/usb/usbnet.c:1772
https://git.kernel.org/stable/c/11273279012c922f37cfb4dd95d142803fc07b98
https://git.kernel.org/stable/c/30a9e834c74e260533b8d0885e3c89f6f32f7993
https://git.kernel.org/stable/c/405b0d610745fb5e84fc2961d9b960abb9f3d107
https://git.kernel.org/stable/c/60790d287c1a1ced3554d4a87c2f27bf299a932a
https://git.kernel.org/stable/c/7c01863b1c47f040d9674171e77789a423b9b128
https://git.kernel.org/stable/c/8c97655275482ef5384ce0501640630a0fc0f6f4
https://git.kernel.org/stable/c/acb47a40b5e38be03ef659b7bacdddc592ed73b7
https://git.kernel.org/stable/c/f398d2dfe450ce2c031d10b585448862d74a0501
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-38153
Resultados similares
Coincidentes en almenos en 50% de los tags
18-12-2025 CVE-2025-38157
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k_htc: Abort sof...
Ver información
18-12-2025 CVE-2025-38154
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Avoid using ...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por