{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-22050","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-29T08:45:45.811Z","datePublished":"2025-04-16T14:12:08.954Z","dateUpdated":"2026-05-11T21:11:40.274Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:11:40.274Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet:fix NPE during rx_complete\n\nMissing usbnet_going_away Check in Critical Path.\nThe usb_submit_urb function lacks a usbnet_going_away\nvalidation, whereas __usbnet_queue_skb includes this check.\n\nThis inconsistency creates a race condition where:\nA URB request may succeed, but the corresponding SKB data\nfails to be queued.\n\nSubsequent processes:\n(e.g., rx_complete → defer_bh → __skb_unlink(skb, list))\nattempt to access skb->next, triggering a NULL pointer\ndereference (Kernel Panic)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/usb/usbnet.c"],"versions":[{"version":"b80aacfea6e8d6ed6e430aa13922d6ccf044415a","lessThan":"95789c2f94fd29dce8759f9766baa333f749287c","status":"affected","versionType":"git"},{"version":"869caa8de8cb94514df704ccbe0b024fda4b9398","lessThan":"0f10f83acfd619e13c64d6705908dfd792f19544","status":"affected","versionType":"git"},{"version":"1e44ee6cdd123d6cfe78b4a94e1572e23bbb58ce","lessThan":"acacd48a37b52fc95f621765762c04152b58d642","status":"affected","versionType":"git"},{"version":"04e906839a053f092ef53f4fb2d610983412b904","lessThan":"d689645cd1594ea1d13cb0c404f8ad1011353e0e","status":"affected","versionType":"git"},{"version":"04e906839a053f092ef53f4fb2d610983412b904","lessThan":"0c30988588b28393e3e8873d5654f910e86391ba","status":"affected","versionType":"git"},{"version":"04e906839a053f092ef53f4fb2d610983412b904","lessThan":"fd9ee3f0d6a53844f65efde581c91bbb0ff749ac","status":"affected","versionType":"git"},{"version":"04e906839a053f092ef53f4fb2d610983412b904","lessThan":"51de3600093429e3b712e5f091d767babc5dd6df","status":"affected","versionType":"git"},{"version":"ca124236cd14e61610f56df9a8f81376a1ffe660","status":"affected","versionType":"git"},{"version":"54671d731f4977fb3c0c26f2840655b5204e4437","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/usb/usbnet.c"],"versions":[{"version":"6.12","status":"affected"},{"version":"0","lessThan":"6.12","status":"unaffected","versionType":"semver"},{"version":"5.15.180","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.134","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.87","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.23","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13.11","lessThanOrEqual":"6.13.*","status":"unaffected","versionType":"semver"},{"version":"6.14.2","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.168","versionEndExcluding":"5.15.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.113","versionEndExcluding":"6.1.134"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.54","versionEndExcluding":"6.6.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.12.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.13.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.14.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12","versionEndExcluding":"6.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.10.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/95789c2f94fd29dce8759f9766baa333f749287c"},{"url":"https://git.kernel.org/stable/c/0f10f83acfd619e13c64d6705908dfd792f19544"},{"url":"https://git.kernel.org/stable/c/acacd48a37b52fc95f621765762c04152b58d642"},{"url":"https://git.kernel.org/stable/c/d689645cd1594ea1d13cb0c404f8ad1011353e0e"},{"url":"https://git.kernel.org/stable/c/0c30988588b28393e3e8873d5654f910e86391ba"},{"url":"https://git.kernel.org/stable/c/fd9ee3f0d6a53844f65efde581c91bbb0ff749ac"},{"url":"https://git.kernel.org/stable/c/51de3600093429e3b712e5f091d767babc5dd6df"}],"title":"usbnet:fix NPE during rx_complete","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:41:32.888Z"}}]}}