CVE-2025-40140
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper handling of the transmit (TX) queue in the Linux kernel's rtl8150 USB network driver. Specifically, the function rtl8150_set_multicast incorrectly calls netif_stop_queue and netif_wake_queue, which disrupts the TX queue synchronization. This leads to a situation where the TX queue is woken up before the USB request block (URB) transmission is complete, causing a double submission of the URB in rtl8150_start_xmit. The issue arises because rtl8150_set_multicast should not manage TX queue synchronization; this is already safely handled by the net core function dev_set_rx_mode. The fix removes the disruptive calls to netif_wake_queue in rtl8150_set_multicast to prevent this problem.
How can this vulnerability impact me? :
This vulnerability can cause improper synchronization of the network transmit queue, potentially leading to double submission of USB network packets. This may result in network instability, degraded performance, or unexpected behavior in network communications on affected systems using the rtl8150 USB network driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for warnings related to rtl8150_start_xmit/usb_submit_urb in the system logs, as syzbot reported such warnings. Checking kernel logs (e.g., using 'dmesg' or 'journalctl') for messages related to rtl8150_start_xmit or usb_submit_urb may help identify the issue. Specific commands to check logs include: 'dmesg | grep rtl8150_start_xmit' or 'journalctl -k | grep usb_submit_urb'.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the vulnerability is resolved by removing the disruptive netif_wake_queue call in rtl8150_set_multicast, as the net core function dev_set_rx_mode now safely handles TX queue synchronization. Until then, avoid using affected kernel versions or disable the affected USB network device if possible.