-
CVE-2025-68781
- EPSS 0.02%
- Veröffentlicht 13.01.2026 15:28:56
- Zuletzt bearbeitet 14.01.2026 16:26:00
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal
The delayed work item otg_event is initialized in fsl_otg_conf() and
scheduled under two conditions:
1. When a host controller binds to the OTG controller.
2. When the USB ID pin state changes (cable insertion/removal).
A race condition occurs when the device is removed via fsl_otg_remove():
the fsl_otg instance may be freed while the delayed work is still pending
or executing. This leads to use-after-free when the work function
fsl_otg_event() accesses the already freed memory.
The problematic scenario:
(detach thread) | (delayed work)
fsl_otg_remove() |
kfree(fsl_otg_dev) //FREE| fsl_otg_event()
| og = container_of(...) //USE
| og-> //USE
Fix this by calling disable_delayed_work_sync() in fsl_otg_remove()
before deallocating the fsl_otg structure. This ensures the delayed work
is properly canceled and completes execution prior to memory deallocation.
This bug was identified through static analysis.Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
4476c73bbbb09b13a962176fca934b32d3954a2e
Version
0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status
affected
Version <
319f7a85b3c4e34ac2fe083eb146fe129a556317
Version
0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status
affected
Version <
69f9a0701abc3d1f8225074c56c27e6c16a37222
Version
0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status
affected
Version <
2e7c47e2eb3cfeadf78a1ccbac8492c60d508f23
Version
0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status
affected
Version <
41ca62e3e21e48c2903b3b45e232cf4f2ff7434f
Version
0807c500a1a6d7fa20cbd7bbe7fea14a66112463
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.0
Status
affected
Version <
3.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.160
Status
unaffected
Version <=
6.6.*
Version
6.6.120
Status
unaffected
Version <=
6.12.*
Version
6.12.64
Status
unaffected
Version <=
6.18.*
Version
6.18.3
Status
unaffected
Version <=
*
Version
6.19-rc3
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|