{"id":"CVE-2025-40140","summary":"net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.","modified":"2026-03-20T12:43:11.586093Z","published":"2025-11-12T10:23:24.586Z","related":["SUSE-SU-2025:4393-1","SUSE-SU-2025:4422-1","SUSE-SU-2025:4505-1","SUSE-SU-2025:4516-1","SUSE-SU-2025:4517-1","SUSE-SU-2025:4521-1","SUSE-SU-2026:20012-1","SUSE-SU-2026:20015-1","SUSE-SU-2026:20021-1","SUSE-SU-2026:20039-1","SUSE-SU-2026:20059-1","SUSE-SU-2026:20473-1","SUSE-SU-2026:20496-1","openSUSE-SU-2025:20172-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40140.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/114e05344763a102a8844efd96ec06ba99293ccd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1a08a37ac03d07a1608a1592791041cac979fbc3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/54f8ef1a970a8376e5846ed90854decf7c00555d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6053e47bbf212b93c051beb4261d7d5a409d0ce3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6394bade9daab8e318c165fe43bba012bf13cd8e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/958baf5eaee394e5fd976979b0791a875f14a179"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9d72df7f5eac946f853bf49c428c4e87a17d91da"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cce3c0e21cdd15bcba5c35d3af1700186de8f187"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40140.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40140"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"cce3c0e21cdd15bcba5c35d3af1700186de8f187"},{"fixed":"1a08a37ac03d07a1608a1592791041cac979fbc3"},{"fixed":"54f8ef1a970a8376e5846ed90854decf7c00555d"},{"fixed":"114e05344763a102a8844efd96ec06ba99293ccd"},{"fixed":"6394bade9daab8e318c165fe43bba012bf13cd8e"},{"fixed":"6053e47bbf212b93c051beb4261d7d5a409d0ce3"},{"fixed":"9d72df7f5eac946f853bf49c428c4e87a17d91da"},{"fixed":"958baf5eaee394e5fd976979b0791a875f14a179"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40140.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.12"},{"fixed":"5.4.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.156"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40140.json"}}],"schema_version":"1.7.5"}