CVE-2025-68194
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| media | imon | * |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's imon media driver involves three main problems causing hung tasks by indefinitely holding a device lock. First, the usb_rx_callback_intf0() function repeatedly resubmits USB requests (URBs) upon receiving a -EPROTO error without a robust error-recovery scheme, leading to continuous retries and printk() flooding (RCU stalls). Second, the function resubmits URBs even before the device interface is fully present, causing hung tasks without flooding. Third, if usb_rx_callback_intf0() is not called (due to flaky hardware), the send_packet() function waits indefinitely for completion, causing hung tasks. The patch fixes these by improving error handling, adjusting checks for device presence, and adding a timeout to send_packet()'s wait.
How can this vulnerability impact me? :
This vulnerability can cause the system to experience hung tasks due to the imon driver indefinitely holding device locks. This can lead to system instability, degraded performance, or unresponsiveness, especially in scenarios involving USB media devices using the imon driver. The continuous retries and printk() flooding can also cause resource exhaustion and potential system stalls.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the imon driver has been patched to fix the issues causing hung tasks and infinite retries. The patch improves error recovery by limiting retries on -EPROTO errors, moves device presence checks to prevent hung tasks, and adds a timeout to send_packet() to avoid indefinite waits. Until the patch is applied, consider monitoring for hung tasks related to the imon driver and avoid using affected hardware if possible.