From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7DD7D477E42 for ; Wed, 13 May 2026 15:09:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778684948; cv=none; b=JVYVTSjHXoSHlPRefBmbzJl0XKonbfRUKC3WWeGBhTZ4ogavF50lOFOSKyyoDBxDKbvvmDrMBL8/uKc8KeH9+fatpuHCySUFE+i+3qnupdkniwlteJFQDbwg6MurU7Dh7lg+5s+RhyUyZQOBMe1DoBDUJY1pYo7ebQjZqNlX8Ig= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778684948; c=relaxed/simple; bh=e7iXTPI6PmqIFRD7jYMyZRka9gS66f1xh8zkFlvs/H0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=oJPsisbxkVk7WH7jK+p/NrrAGccTG7wRCgStXI1+7emNBEsCLH+CKFwVjfnFBCzD/VsLZclPu2V44uUDp5j5BhW2nfkIezWGM/WCWnghhdn1d6FWIFAk8EvVbsYwj+JOyxYmb324YFWuKT+oUjMhcNcQChO17pYWtpZfvRt76wg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=OsMp7kKf; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="OsMp7kKf" Received: by smtp.kernel.org (Postfix) with ESMTPSA id F168AC2BCB7; Wed, 13 May 2026 15:09:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778684948; bh=e7iXTPI6PmqIFRD7jYMyZRka9gS66f1xh8zkFlvs/H0=; h=From:To:Cc:Subject:Date:Reply-To:From; b=OsMp7kKf0HzppM/sAkdoum5ANTLYksiDPVIkDXKwHViTu18OuU7mbfFyI3TPDGAhA REb7YkZb/3AzKaowmka9lZ/RJaRvtXr12VLqVrs2vvzcIzdkhtMqmAd4sevm+3D2OU iwAZZFMUjk/fLvM+d7Qo7FEcum46lgCQLcRhpUG0= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: CVE-2026-43479: net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect Date: Wed, 13 May 2026 17:08:47 +0200 Message-ID: <2026051348-CVE-2026-43479-7738@gregkh> X-Mailer: git-send-email 2.54.0 Reply-To: , Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=4985; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=jrol6z6wGavplJ8IaS/gTQ0aljYcyN7HX1Z5yLiC+uA=; b=owGbwMvMwCRo6H6F97bub03G02pJDFksUxg6plovm3iL+1yqT9IX28wvj75E72SL91rctf53h K/moYpjHbEsDIJMDLJiiixftvEc3V9xSNHL0PY0zBxWJpAhDFycAjCRv0sZ5pctmntxKdfPTc1H foVfOP8g/Krn8x0MC5blvVqV/zYw4XHWuYdxzFPdpfJW3gQA X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit From: Greg Kroah-Hartman Description =========== In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect Remove redundant netif_napi_del() call from disconnect path. A WARN may be triggered in __netif_napi_del_locked() during USB device disconnect: WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350 This happens because netif_napi_del() is called in the disconnect path while NAPI is still enabled. However, it is not necessary to call netif_napi_del() explicitly, since unregister_netdev() will handle NAPI teardown automatically and safely. Removing the redundant call avoids triggering the warning. Full trace: lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV lan78xx 1-1:1.0 enu1: Link is Down lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV ------------[ cut here ]------------ WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350 Modules linked in: flexcan can_dev fuse CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT Hardware name: SKOV IMX8MP CPU revC - bd500 (DT) Workqueue: usb_hub_wq hub_event pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __netif_napi_del_locked+0x2b4/0x350 lr : __netif_napi_del_locked+0x7c/0x350 sp : ffffffc085b673c0 x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8 x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000 x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000 x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028 x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8 x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000 x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001 x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000 Call trace: __netif_napi_del_locked+0x2b4/0x350 (P) lan78xx_disconnect+0xf4/0x360 usb_unbind_interface+0x158/0x718 device_remove+0x100/0x150 device_release_driver_internal+0x308/0x478 device_release_driver+0x1c/0x30 bus_remove_device+0x1a8/0x368 device_del+0x2e0/0x7b0 usb_disable_device+0x244/0x540 usb_disconnect+0x220/0x758 hub_event+0x105c/0x35e0 process_one_work+0x760/0x17b0 worker_thread+0x768/0xce8 kthread+0x3bc/0x690 ret_from_fork+0x10/0x20 irq event stamp: 211604 hardirqs last enabled at (211603): [] _raw_spin_unlock_irqrestore+0x84/0x98 hardirqs last disabled at (211604): [] el1_dbg+0x24/0x80 softirqs last enabled at (211296): [] handle_softirqs+0x820/0xbc8 softirqs last disabled at (210993): [] __do_softirq+0x18/0x20 ---[ end trace 0000000000000000 ]--- lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0 The Linux kernel CVE team has assigned CVE-2026-43479 to this issue. Affected and fixed versions =========================== Issue introduced in 6.17 with commit e110bc82589752909e283ba5cbc160e0ab56c085 and fixed in 6.18.19 with commit 20ce2bd1c1848414c5d3520d301ed3f5751ed634 Issue introduced in 6.17 with commit e110bc82589752909e283ba5cbc160e0ab56c085 and fixed in 6.19.9 with commit 395a8b903738511f536c97c427e15ef038e1a11c Issue introduced in 6.17 with commit e110bc82589752909e283ba5cbc160e0ab56c085 and fixed in 7.0 with commit 312c816c6bc30342bc30dca0d6db617ab4d3ae4e Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2026-43479 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: drivers/net/usb/lan78xx.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/20ce2bd1c1848414c5d3520d301ed3f5751ed634 https://git.kernel.org/stable/c/395a8b903738511f536c97c427e15ef038e1a11c https://git.kernel.org/stable/c/312c816c6bc30342bc30dca0d6db617ab4d3ae4e