CVE-2025-40053

Source
https://cve.org/CVERecord?id=CVE-2025-40053
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40053.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40053
Downstream
Related
Published
2025-10-28T11:48:28.444Z
Modified
2026-03-12T03:54:31.490717Z
Summary
net: dlink: handle copy_thresh allocation failure
Details

In the Linux kernel, the following vulnerability has been resolved:

net: dlink: handle copy_thresh allocation failure

The driver did not handle failure of netdev_alloc_skb_ip_align(). If the allocation failed, dereferencing skb->protocol could lead to a NULL pointer dereference.

This patch tries to allocate skb. If the allocation fails, it falls back to the normal path.

Tested-on: D-Link DGE-550T Rev-A3

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40053.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
84fd710a704f3d53d4120e452e86cea558cf73a8
Fixed
5aa9b885602811a026a3f45c92ea2b4b04c54f09
Fixed
9d49e4b14609e1a20d931e718962c4b6b5485174
Fixed
ea87151df398d407a632c7bf63013290f01c5009
Fixed
7ed5010fef0930f4322d620052edc854ef3ec41f
Fixed
fd7b6b2c920d7fd370a612be416a904d6e1ebe55
Fixed
8169a6011c5fecc6cb1c3654c541c567d3318de8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40053.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.10.246
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.195
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.156
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.112
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.53
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40053.json"