-

CVE-2025-68781

In the Linux kernel, the following vulnerability has been resolved:

usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal

The delayed work item otg_event is initialized in fsl_otg_conf() and
scheduled under two conditions:
1. When a host controller binds to the OTG controller.
2. When the USB ID pin state changes (cable insertion/removal).

A race condition occurs when the device is removed via fsl_otg_remove():
the fsl_otg instance may be freed while the delayed work is still pending
or executing. This leads to use-after-free when the work function
fsl_otg_event() accesses the already freed memory.

The problematic scenario:

(detach thread)            | (delayed work)
fsl_otg_remove()           |
  kfree(fsl_otg_dev) //FREE| fsl_otg_event()
                           |   og = container_of(...) //USE
                           |   og-> //USE

Fix this by calling disable_delayed_work_sync() in fsl_otg_remove()
before deallocating the fsl_otg structure. This ensures the delayed work
is properly canceled and completes execution prior to memory deallocation.

This bug was identified through static analysis.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 4476c73bbbb09b13a962176fca934b32d3954a2e
Version 0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status affected
Version < 319f7a85b3c4e34ac2fe083eb146fe129a556317
Version 0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status affected
Version < 69f9a0701abc3d1f8225074c56c27e6c16a37222
Version 0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status affected
Version < 2e7c47e2eb3cfeadf78a1ccbac8492c60d508f23
Version 0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status affected
Version < 41ca62e3e21e48c2903b3b45e232cf4f2ff7434f
Version 0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.0
Status affected
Version < 3.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.64
Status unaffected
Version <= 6.18.*
Version 6.18.3
Status unaffected
Version <= *
Version 6.19-rc3
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.