{"id":"CVE-2025-38153","summary":"net: usb: aqc111: fix error handling of usbnet read calls","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: aqc111: fix error handling of usbnet read calls\n\nSyzkaller, courtesy of syzbot, identified an error (see report [1]) in\naqc111 driver, caused by incomplete sanitation of usb read calls'\nresults. This problem is quite similar to the one fixed in commit\n920a9fa27e78 (\"net: asix: add proper error handling of usb read errors\").\n\nFor instance, usbnet_read_cmd() may read fewer than 'size' bytes,\neven if the caller expected the full amount, and aqc111_read_cmd()\nwill not check its result properly. As [1] shows, this may lead\nto MAC address in aqc111_bind() being only partly initialized,\ntriggering KMSAN warnings.\n\nFix the issue by verifying that the number of bytes read is\nas expected and not less.\n\n[1] Partial syzbot report:\nBUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]\nBUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830\n is_valid_ether_addr include/linux/etherdevice.h:208 [inline]\n usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:-1 [inline]\n really_probe+0x4d1/0xd90 drivers/base/dd.c:658\n __driver_probe_device+0x268/0x380 drivers/base/dd.c:800\n...\n\nUninit was stored to memory at:\n dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582\n __dev_addr_set include/linux/netdevice.h:4874 [inline]\n eth_hw_addr_set include/linux/etherdevice.h:325 [inline]\n aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n...\n\nUninit was stored to memory at:\n ether_addr_copy include/linux/etherdevice.h:305 [inline]\n aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]\n aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:-1 [inline]\n...\n\nLocal variable buf.i created at:\n aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]\n aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772","modified":"2026-04-16T00:02:25.700635417Z","published":"2025-07-03T08:35:56.526Z","related":["SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:03204-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38153.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/11273279012c922f37cfb4dd95d142803fc07b98"},{"type":"WEB","url":"https://git.kernel.org/stable/c/30a9e834c74e260533b8d0885e3c89f6f32f7993"},{"type":"WEB","url":"https://git.kernel.org/stable/c/405b0d610745fb5e84fc2961d9b960abb9f3d107"},{"type":"WEB","url":"https://git.kernel.org/stable/c/60790d287c1a1ced3554d4a87c2f27bf299a932a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7c01863b1c47f040d9674171e77789a423b9b128"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c97655275482ef5384ce0501640630a0fc0f6f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/acb47a40b5e38be03ef659b7bacdddc592ed73b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f398d2dfe450ce2c031d10b585448862d74a0501"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38153.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38153"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"df2d59a2ab6c9ceac2c4104272fce03493b8f62f"},{"fixed":"8c97655275482ef5384ce0501640630a0fc0f6f4"},{"fixed":"11273279012c922f37cfb4dd95d142803fc07b98"},{"fixed":"f398d2dfe450ce2c031d10b585448862d74a0501"},{"fixed":"acb47a40b5e38be03ef659b7bacdddc592ed73b7"},{"fixed":"60790d287c1a1ced3554d4a87c2f27bf299a932a"},{"fixed":"30a9e834c74e260533b8d0885e3c89f6f32f7993"},{"fixed":"7c01863b1c47f040d9674171e77789a423b9b128"},{"fixed":"405b0d610745fb5e84fc2961d9b960abb9f3d107"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38153.json"}}],"schema_version":"1.7.5"}