CVE-2025-68287
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's USB driver (dwc3). It occurs because multiple concurrent call paths invoke the function dwc3_remove_requests() without proper synchronization. This leads to premature freeing of USB requests, and if other paths access these freed requests, it causes crashes due to use-after-free errors. The issue arises from three distinct execution paths interacting asynchronously, especially during USB reset handling and adb root operations.
How can this vulnerability impact me? :
The vulnerability can cause system crashes due to use-after-free conditions when USB requests are prematurely freed and then accessed concurrently. This can lead to instability or denial of service on affected systems using the Linux kernel's dwc3 USB driver.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the race condition in dwc3_remove_requests(). This patch adds checks for request completion and synchronization to prevent use-after-free crashes. Until the update is applied, avoid operations that trigger concurrent dwc3_remove_requests() calls, such as USB resets or adb root commands that unbind and bind USB functions.