CVE-2025-38153
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
03/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: usb: aqc111: fix error handling of usbnet read calls<br />
<br />
Syzkaller, courtesy of syzbot, identified an error (see report [1]) in<br />
aqc111 driver, caused by incomplete sanitation of usb read calls&#39;<br />
results. This problem is quite similar to the one fixed in commit<br />
920a9fa27e78 ("net: asix: add proper error handling of usb read errors").<br />
<br />
For instance, usbnet_read_cmd() may read fewer than &#39;size&#39; bytes,<br />
even if the caller expected the full amount, and aqc111_read_cmd()<br />
will not check its result properly. As [1] shows, this may lead<br />
to MAC address in aqc111_bind() being only partly initialized,<br />
triggering KMSAN warnings.<br />
<br />
Fix the issue by verifying that the number of bytes read is<br />
as expected and not less.<br />
<br />
[1] Partial syzbot report:<br />
BUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]<br />
BUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830<br />
is_valid_ether_addr include/linux/etherdevice.h:208 [inline]<br />
usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830<br />
usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396<br />
call_driver_probe drivers/base/dd.c:-1 [inline]<br />
really_probe+0x4d1/0xd90 drivers/base/dd.c:658<br />
__driver_probe_device+0x268/0x380 drivers/base/dd.c:800<br />
...<br />
<br />
Uninit was stored to memory at:<br />
dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582<br />
__dev_addr_set include/linux/netdevice.h:4874 [inline]<br />
eth_hw_addr_set include/linux/etherdevice.h:325 [inline]<br />
aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717<br />
usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772<br />
usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396<br />
...<br />
<br />
Uninit was stored to memory at:<br />
ether_addr_copy include/linux/etherdevice.h:305 [inline]<br />
aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]<br />
aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713<br />
usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772<br />
usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396<br />
call_driver_probe drivers/base/dd.c:-1 [inline]<br />
...<br />
<br />
Local variable buf.i created at:<br />
aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]<br />
aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713<br />
usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.0 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/11273279012c922f37cfb4dd95d142803fc07b98
- https://git.kernel.org/stable/c/30a9e834c74e260533b8d0885e3c89f6f32f7993
- https://git.kernel.org/stable/c/405b0d610745fb5e84fc2961d9b960abb9f3d107
- https://git.kernel.org/stable/c/60790d287c1a1ced3554d4a87c2f27bf299a932a
- https://git.kernel.org/stable/c/7c01863b1c47f040d9674171e77789a423b9b128
- https://git.kernel.org/stable/c/8c97655275482ef5384ce0501640630a0fc0f6f4
- https://git.kernel.org/stable/c/acb47a40b5e38be03ef659b7bacdddc592ed73b7
- https://git.kernel.org/stable/c/f398d2dfe450ce2c031d10b585448862d74a0501
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



