Bug 2406738 (CVE-2025-40053) - CVE-2025-40053 kernel: net: dlink: handle copy_thresh allocation failure
Summary: CVE-2025-40053 kernel: net: dlink: handle copy_thresh allocation failure
Keywords:
Status: NEW
Alias: CVE-2025-40053
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-28 12:02 UTC by OSIDB Bzimport
Modified: 2025-10-28 19:12 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-28 12:02:54 UTC
In the Linux kernel, the following vulnerability has been resolved:

net: dlink: handle copy_thresh allocation failure

The driver did not handle failure of `netdev_alloc_skb_ip_align()`.
If the allocation failed, dereferencing `skb->protocol` could lead to
a NULL pointer dereference.

This patch tries to allocate `skb`. If the allocation fails, it falls
back to the normal path.

Tested-on: D-Link DGE-550T Rev-A3


Note You need to log in before you can comment on or make changes to this bug.