-
CVE-2025-38153
- EPSS 0.04%
- Published 03.07.2025 08:35:56
- Last modified 03.07.2025 15:13:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: fix error handling of usbnet read calls Syzkaller, courtesy of syzbot, identified an error (see report [1]) in aqc111 driver, caused by incomplete sanitation of usb read calls' results. This problem is quite similar to the one fixed in commit 920a9fa27e78 ("net: asix: add proper error handling of usb read errors"). For instance, usbnet_read_cmd() may read fewer than 'size' bytes, even if the caller expected the full amount, and aqc111_read_cmd() will not check its result properly. As [1] shows, this may lead to MAC address in aqc111_bind() being only partly initialized, triggering KMSAN warnings. Fix the issue by verifying that the number of bytes read is as expected and not less. [1] Partial syzbot report: BUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline] BUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830 is_valid_ether_addr include/linux/etherdevice.h:208 [inline] usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:-1 [inline] really_probe+0x4d1/0xd90 drivers/base/dd.c:658 __driver_probe_device+0x268/0x380 drivers/base/dd.c:800 ... Uninit was stored to memory at: dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582 __dev_addr_set include/linux/netdevice.h:4874 [inline] eth_hw_addr_set include/linux/etherdevice.h:325 [inline] aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396 ... Uninit was stored to memory at: ether_addr_copy include/linux/etherdevice.h:305 [inline] aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline] aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:-1 [inline] ... Local variable buf.i created at: aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline] aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
8c97655275482ef5384ce0501640630a0fc0f6f4
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
11273279012c922f37cfb4dd95d142803fc07b98
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
f398d2dfe450ce2c031d10b585448862d74a0501
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
acb47a40b5e38be03ef659b7bacdddc592ed73b7
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
60790d287c1a1ced3554d4a87c2f27bf299a932a
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
30a9e834c74e260533b8d0885e3c89f6f32f7993
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
7c01863b1c47f040d9674171e77789a423b9b128
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
Version <
405b0d610745fb5e84fc2961d9b960abb9f3d107
Version
df2d59a2ab6c9ceac2c4104272fce03493b8f62f
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.0
Status
affected
Version <
5.0
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.097 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|