First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Flush the notify_hotplug_work When performing continuous unbind/bind operations on the USB drivers available on the Renesas RZ/G2L SoC, a kernel crash with the message "Unable to handle kernel NULL pointer dereference at virtual address" may occur. This issue points to the usbhsc_notify_hotplug() function. Flush the delayed work to avoid its execution when driver resources are unavailable.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=3.0<5.4.291 | |
Linux Kernel | >=5.5<5.10.235 | |
Linux Kernel | >=5.11<5.15.179 | |
Linux Kernel | >=5.16<6.1.131 | |
Linux Kernel | >=6.2<6.6.83 | |
Linux Kernel | >=6.7<6.12.19 | |
Linux Kernel | >=6.13<6.13.7 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21917 has a medium severity rating due to potential kernel crashes.
To fix CVE-2025-21917, you should update your Linux kernel to the latest patched version.
CVE-2025-21917 affects the Linux kernel specifically on systems utilizing the Renesas RZ/G2L SoC.
If exploited, CVE-2025-21917 can lead to kernel crashes during continuous unbind/bind operations on USB drivers.
CVE-2025-21917 was resolved in a recent update to the Linux kernel, addressing the kernel crash issue.