๐Ÿ” CVE Alert

CVE-2025-22027

MEDIUM 4.7

media: streamzap: fix race between device disconnection and urb callback

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: media: streamzap: fix race between device disconnection and urb callback Syzkaller has reported a general protection fault at function ir_raw_event_store_with_filter(). This crash is caused by a NULL pointer dereference of dev->raw pointer, even though it is checked for NULL in the same function, which means there is a race condition. It occurs due to the incorrect order of actions in the streamzap_disconnect() function: rc_unregister_device() is called before usb_kill_urb(). The dev->raw pointer is freed and set to NULL in rc_unregister_device(), and only after that usb_kill_urb() waits for in-progress requests to finish. If rc_unregister_device() is called while streamzap_callback() handler is not finished, this can lead to accessing freed resources. Thus rc_unregister_device() should be called after usb_kill_urb(). Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8e9e60640067858e8036d4d43bbf725c60613359 < e11652a6514ec805440c1bb3739e6c6236fffcc7 8e9e60640067858e8036d4d43bbf725c60613359 < f1d518c0bad01abe83c2df880274cb6a39f4a457 8e9e60640067858e8036d4d43bbf725c60613359 < 30ef7cfee752ca318d5902cb67b60d9797ccd378 8e9e60640067858e8036d4d43bbf725c60613359 < 15483afb930fc2f883702dc96f80efbe4055235e 8e9e60640067858e8036d4d43bbf725c60613359 < adf0ddb914c9e5b3e50da4c97959e82de2df75c3 8e9e60640067858e8036d4d43bbf725c60613359 < 4db62b60af2ccdea6ac5452fd20e29587ed85f57 8e9e60640067858e8036d4d43bbf725c60613359 < 8760da4b9d44c36b93b6e4cf401ec7fe520015bd 8e9e60640067858e8036d4d43bbf725c60613359 < f656cfbc7a293a039d6a0c7100e1c846845148c1
Linux / Linux
2.6.36

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/e11652a6514ec805440c1bb3739e6c6236fffcc7 git.kernel.org: https://git.kernel.org/stable/c/f1d518c0bad01abe83c2df880274cb6a39f4a457 git.kernel.org: https://git.kernel.org/stable/c/30ef7cfee752ca318d5902cb67b60d9797ccd378 git.kernel.org: https://git.kernel.org/stable/c/15483afb930fc2f883702dc96f80efbe4055235e git.kernel.org: https://git.kernel.org/stable/c/adf0ddb914c9e5b3e50da4c97959e82de2df75c3 git.kernel.org: https://git.kernel.org/stable/c/4db62b60af2ccdea6ac5452fd20e29587ed85f57 git.kernel.org: https://git.kernel.org/stable/c/8760da4b9d44c36b93b6e4cf401ec7fe520015bd git.kernel.org: https://git.kernel.org/stable/c/f656cfbc7a293a039d6a0c7100e1c846845148c1 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html