Network Driver Vulnerability in Renesas Ethernet Devices
CVE-2025-21801
Summary
A vulnerability in the Renesas Ethernet driver has been identified that affects the proper handling of the rtnl lock during suspend/resume operations. Failure to correctly implement the rtnl lock can lead to potential conflicts with ongoing network driver operations, triggering warnings concerning RCU usage. This could compromise the stability and reliability of network communications in devices utilizing this driver, particularly during critical suspend or resume cycles. Ensuring that the lock is held as necessary mitigates these risks, strengthening the overall integrity of the network subsystem.
Affected Version(s)
Linux 0184165b2f42c4b032da9dd11546bfbaeb5afd4e < 0296981941cf291edfbc318d3255a93439f368e4
Linux 0184165b2f42c4b032da9dd11546bfbaeb5afd4e
Linux 0184165b2f42c4b032da9dd11546bfbaeb5afd4e < 2c2ebb2b49573e5f8726112ad06b1dffc3c9ea03
References
Timeline
Vulnerability published
Vulnerability Reserved