CVE-2025-38385
Severity CVSS v4.0:
Pending analysis
Type:
CWE-404
Improper Resource Shutdown or Release
Publication date:
25/07/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect<br />
<br />
Remove redundant netif_napi_del() call from disconnect path.<br />
<br />
A WARN may be triggered in __netif_napi_del_locked() during USB device<br />
disconnect:<br />
<br />
WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350<br />
<br />
This happens because netif_napi_del() is called in the disconnect path while<br />
NAPI is still enabled. However, it is not necessary to call netif_napi_del()<br />
explicitly, since unregister_netdev() will handle NAPI teardown automatically<br />
and safely. Removing the redundant call avoids triggering the warning.<br />
<br />
Full trace:<br />
lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV<br />
lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV<br />
lan78xx 1-1:1.0 enu1: Link is Down<br />
lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV<br />
------------[ cut here ]------------<br />
WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350<br />
Modules linked in: flexcan can_dev fuse<br />
CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT<br />
Hardware name: SKOV IMX8MP CPU revC - bd500 (DT)<br />
Workqueue: usb_hub_wq hub_event<br />
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br />
pc : __netif_napi_del_locked+0x2b4/0x350<br />
lr : __netif_napi_del_locked+0x7c/0x350<br />
sp : ffffffc085b673c0<br />
x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8<br />
x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb<br />
x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000<br />
x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000<br />
x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028<br />
x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8<br />
x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000<br />
x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001<br />
x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000<br />
x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000<br />
Call trace:<br />
__netif_napi_del_locked+0x2b4/0x350 (P)<br />
lan78xx_disconnect+0xf4/0x360<br />
usb_unbind_interface+0x158/0x718<br />
device_remove+0x100/0x150<br />
device_release_driver_internal+0x308/0x478<br />
device_release_driver+0x1c/0x30<br />
bus_remove_device+0x1a8/0x368<br />
device_del+0x2e0/0x7b0<br />
usb_disable_device+0x244/0x540<br />
usb_disconnect+0x220/0x758<br />
hub_event+0x105c/0x35e0<br />
process_one_work+0x760/0x17b0<br />
worker_thread+0x768/0xce8<br />
kthread+0x3bc/0x690<br />
ret_from_fork+0x10/0x20<br />
irq event stamp: 211604<br />
hardirqs last enabled at (211603): [] _raw_spin_unlock_irqrestore+0x84/0x98<br />
hardirqs last disabled at (211604): [] el1_dbg+0x24/0x80<br />
softirqs last enabled at (211296): [] handle_softirqs+0x820/0xbc8<br />
softirqs last disabled at (210993): [] __do_softirq+0x18/0x20<br />
---[ end trace 0000000000000000 ]---<br />
lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 6.1.144 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.97 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.37 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/17a37b9a5dd945d86110838fb471e7139ba993a2
- https://git.kernel.org/stable/c/510a6095d754df9d727f644ec5076b7929d6c9ea
- https://git.kernel.org/stable/c/6c7ffc9af7186ed79403a3ffee9a1e5199fc7450
- https://git.kernel.org/stable/c/7135056a49035597198280820c61b8c5dbe4a1d0
- https://git.kernel.org/stable/c/968a419c95131e420f12bbdba19e96e2f6b071c4
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



