๐Ÿ” CVE Alert

CVE-2025-21708

UNKNOWN 0.0

net: usb: rtl8150: enable basic endpoint checking

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: enable basic endpoint checking Syzkaller reports [1] encountering a common issue of utilizing a wrong usb endpoint type during URB submitting stage. This, in turn, triggers a warning shown below. For now, enable simple endpoint checking (specifically, bulk and interrupt eps, testing control one is not essential) to mitigate the issue with a view to do other related cosmetic changes later, if they are necessary. [1] Syzkaller report: usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 1 PID: 2586 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 driv> Modules linked in: CPU: 1 UID: 0 PID: 2586 Comm: dhcpcd Not tainted 6.11.0-rc4-syzkaller-00069-gfc88bb11617> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503 Code: 84 3c 02 00 00 e8 05 e4 fc fc 4c 89 ef e8 fd 25 d7 fe 45 89 e0 89 e9 4c 89 f2 48 8> RSP: 0018:ffffc9000441f740 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffff888112487a00 RCX: ffffffff811a99a9 RDX: ffff88810df6ba80 RSI: ffffffff811a99b6 RDI: 0000000000000001 RBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001 R13: ffff8881023bf0a8 R14: ffff888112452a20 R15: ffff888112487a7c FS: 00007fc04eea5740(0000) GS:ffff8881f6300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0a1de9f870 CR3: 000000010dbd0000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> rtl8150_open+0x300/0xe30 drivers/net/usb/rtl8150.c:733 __dev_open+0x2d4/0x4e0 net/core/dev.c:1474 __dev_change_flags+0x561/0x720 net/core/dev.c:8838 dev_change_flags+0x8f/0x160 net/core/dev.c:8910 devinet_ioctl+0x127a/0x1f10 net/ipv4/devinet.c:1177 inet_ioctl+0x3aa/0x3f0 net/ipv4/af_inet.c:1003 sock_do_ioctl+0x116/0x280 net/socket.c:1222 sock_ioctl+0x22e/0x6c0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl fs/ioctl.c:893 [inline] __x64_sys_ioctl+0x193/0x220 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc04ef73d49 ... This change has not been tested on real hardware.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 431be4f78220d34ce21d67a6b843b7ca81bd82e9 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 8f78a2b9ed4cb1e62c60d0a8905d9a37bc18c20d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d42168f109f96b5d18812a789086015a435ee667 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e10b392a7495a5dbbb25247e2c17d380d9899263 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 3c706829ceb6e347bd4ddfd17f1d3048acd69da2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f395b7efcee8df54309eb2d4a624ef13f5d88b66 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c843515ad2be7349dd6b60e5fd299d0da0b8458b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 90b7f2961798793275b4844348619b622f983907
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/431be4f78220d34ce21d67a6b843b7ca81bd82e9 git.kernel.org: https://git.kernel.org/stable/c/8f78a2b9ed4cb1e62c60d0a8905d9a37bc18c20d git.kernel.org: https://git.kernel.org/stable/c/d42168f109f96b5d18812a789086015a435ee667 git.kernel.org: https://git.kernel.org/stable/c/e10b392a7495a5dbbb25247e2c17d380d9899263 git.kernel.org: https://git.kernel.org/stable/c/3c706829ceb6e347bd4ddfd17f1d3048acd69da2 git.kernel.org: https://git.kernel.org/stable/c/f395b7efcee8df54309eb2d4a624ef13f5d88b66 git.kernel.org: https://git.kernel.org/stable/c/c843515ad2be7349dd6b60e5fd299d0da0b8458b git.kernel.org: https://git.kernel.org/stable/c/90b7f2961798793275b4844348619b622f983907 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html