-
CVE-2025-68287
- EPSS 0.08%
- Veröffentlicht 16.12.2025 15:06:08
- Zuletzt bearbeitet 18.12.2025 15:08:06
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB requests and subsequent crashes. Three distinct execution paths interact with `dwc3_remove_requests()`: Path 1: Triggered via `dwc3_gadget_reset_interrupt()` during USB reset handling. The call stack includes: - `dwc3_ep0_reset_state()` - `dwc3_ep0_stall_and_restart()` - `dwc3_ep0_out_start()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 2: Also initiated from `dwc3_gadget_reset_interrupt()`, but through `dwc3_stop_active_transfers()`. The call stack includes: - `dwc3_stop_active_transfers()` - `dwc3_remove_requests()` - `dwc3_gadget_del_and_unmap_request()` Path 3: Occurs independently during `adb root` execution, which triggers USB function unbind and bind operations. The sequence includes: - `gserial_disconnect()` - `usb_ep_disable()` - `dwc3_gadget_ep_disable()` - `dwc3_remove_requests()` with `-ESHUTDOWN` status Path 3 operates asynchronously and lacks synchronization with Paths 1 and 2. When Path 3 completes, it disables endpoints and frees 'out' requests. If Paths 1 or 2 are still processing these requests, accessing freed memory leads to a crash due to use-after-free conditions. To fix this added check for request completion and skip processing if already completed and added the request status for ep0 while queue.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
467add9db13219101f14b6cc5477998b4aaa5fe2
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
67192e8cb7f941b5bba91e4bb290683576ce1607
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
47de14d741cc4057046c9e2f33df1f7828254e6c
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
afc0e34f161ce61ad351303c46eb57bd44b8b090
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
7cfb62888eba292fa35cd9ddbd28ce595f60e139
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
fa5eaf701e576880070b60922200557ae4aa54e1
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
Version <
e4037689a366743c4233966f0e74bc455820d316
Version
72246da40f3719af3bfd104a2365b32537c27d83
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.2
Status
affected
Version <
3.2
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.247
Status
unaffected
Version <=
5.15.*
Version
5.15.197
Status
unaffected
Version <=
6.1.*
Version
6.1.159
Status
unaffected
Version <=
6.6.*
Version
6.6.119
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.238 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|