In the Linux kernel, the following vulnerability has been resolved: usbnet: ipheth: do not stop RX on failing RX callback RX callbacks can fail for multiple reasons: * Payload too short * Payload formatted incorrecly (e.g. bad NCM framing) * Lack of memory None of these should cause the driver to seize up. Make such failures non-critical and continue processing further incoming URBs.
https://git.kernel.org/stable/c/74efed51e0a4d62f998f806c307778b47fc73395
https://git.kernel.org/stable/c/4d1cfa3afb8627435744ecdc6d8b58bc72ee0f4c
https://git.kernel.org/stable/c/08ca800b0cd56d5e26722f68b18bbbf6840bf44b