First published: Wed Apr 16 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: staging: gpib: Fix Oops after disconnect in ni_usb If the usb dongle is disconnected subsequent calls to the driver cause a NULL dereference Oops as the bus_interface is set to NULL on disconnect. This problem was introduced by setting usb_dev from the bus_interface for dev_xxx messages. Previously bus_interface was checked for NULL only in the the functions directly calling usb_fill_bulk_urb or usb_control_msg. Check for valid bus_interface on all interface entry points and return -ENODEV if it is NULL.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=6.13<6.13.11 | |
Linux Kernel | >=6.14<6.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22052 has been classified as a moderate severity vulnerability due to the potential for system crashes caused by NULL dereferences.
To fix CVE-2025-22052, update the Linux kernel to a version above 6.14.2 or apply the patches provided in the kernel's stable repository.
CVE-2025-22052 affects certain versions of the Linux kernel, specifically versions between 6.13 and 6.14.2.
CVE-2025-22052 is a NULL pointer dereference vulnerability that can lead to system instability when interacting with specific USB dongles.
CVE-2025-22052 is not remotely exploitable, as it requires the physical disconnection of a USB device to trigger the vulnerability.