Acknowledged
Created: Nov 12, 2025
Updated: Nov 26, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast[EOL][EOL]syzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.[EOL]This is the sequence of events that leads to the warning:[EOL][EOL]rtl8150_start_xmit() {[EOL]\tnetif_stop_queue();[EOL]\tusb_submit_urb(dev->tx_urb);[EOL]}[EOL][EOL]rtl8150_set_multicast() {[EOL]\tnetif_stop_queue();[EOL]\tnetif_wake_queue();\t\t<-- wakes up TX queue before URB is done[EOL]}[EOL][EOL]rtl8150_start_xmit() {[EOL]\tnetif_stop_queue();[EOL]\tusb_submit_urb(dev->tx_urb);\t<-- double submission[EOL]}[EOL][EOL]rtl8150_set_multicast being the ndo_set_rx_mode callback should not be[EOL]calling netif_stop_queue and notif_start_queue as these handle[EOL]TX queue synchronization.[EOL][EOL]The net core function dev_set_rx_mode handles the synchronization[EOL]for rtl8150_set_multicast making it safe to remove these locks.