Wind River Support Network

HomeDefectsLIN1023-14193
Acknowledged

LIN1023-14193 : Security Advisory - linux - CVE-2025-38385

Created: Jul 28, 2025    Updated: Jul 29, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect[EOL][EOL]Remove redundant netif_napi_del() call from disconnect path.[EOL][EOL]A WARN may be triggered in __netif_napi_del_locked() during USB device[EOL]disconnect:[EOL][EOL]  WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350[EOL][EOL]This happens because netif_napi_del() is called in the disconnect path while[EOL]NAPI is still enabled. However, it is not necessary to call netif_napi_del()[EOL]explicitly, since unregister_netdev() will handle NAPI teardown automatically[EOL]and safely. Removing the redundant call avoids triggering the warning.[EOL][EOL]Full trace:[EOL] lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV[EOL] lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV[EOL] lan78xx 1-1:1.0 enu1: Link is Down[EOL] lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV[EOL] ------------[ cut here ]------------[EOL] WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350[EOL] Modules linked in: flexcan can_dev fuse[EOL] CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT[EOL] Hardware name: SKOV IMX8MP CPU revC - bd500 (DT)[EOL] Workqueue: usb_hub_wq hub_event[EOL] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)[EOL] pc : __netif_napi_del_locked+0x2b4/0x350[EOL] lr : __netif_napi_del_locked+0x7c/0x350[EOL] sp : ffffffc085b673c0[EOL] x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8[EOL] x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb[EOL] x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000[EOL] x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000[EOL] x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028[EOL] x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8[EOL] x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000[EOL] x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001[EOL] x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000[EOL] x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000[EOL] Call trace:[EOL]  __netif_napi_del_locked+0x2b4/0x350 (P)[EOL]  lan78xx_disconnect+0xf4/0x360[EOL]  usb_unbind_interface+0x158/0x718[EOL]  device_remove+0x100/0x150[EOL]  device_release_driver_internal+0x308/0x478[EOL]  device_release_driver+0x1c/0x30[EOL]  bus_remove_device+0x1a8/0x368[EOL]  device_del+0x2e0/0x7b0[EOL]  usb_disable_device+0x244/0x540[EOL]  usb_disconnect+0x220/0x758[EOL]  hub_event+0x105c/0x35e0[EOL]  process_one_work+0x760/0x17b0[EOL]  worker_thread+0x768/0xce8[EOL]  kthread+0x3bc/0x690[EOL]  ret_from_fork+0x10/0x20[EOL] irq event stamp: 211604[EOL] hardirqs last  enabled at (211603): [<ffffffc0828cc9ec>] _raw_spin_unlock_irqrestore+0x84/0x98[EOL] hardirqs last disabled at (211604): [<ffffffc0828a9a84>] el1_dbg+0x24/0x80[EOL] softirqs last  enabled at (211296): [<ffffffc080095f10>] handle_softirqs+0x820/0xbc8[EOL] softirqs last disabled at (210993): [<ffffffc080010288>] __do_softirq+0x18/0x20[EOL] ---[ end trace 0000000000000000 ]---[EOL] lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0

CREATE(Triage):(User=admin) [CVE-2025-38385 (https://nvd.nist.gov/vuln/detail/CVE-2025-38385)
Live chat
Online