CVE-2025-68288
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's USB storage subsystem. Specifically, when USB storage devices skip the data phase but still provide status data, the kernel code extracts and validates the Command Status Wrapper (CSW) from the scatter-gather (sg) buffer but fails to clear it afterward. This leaves USB protocol status data in the transfer buffer, which can leak to user space through SCSI generic (/dev/sg*) interfaces. The leak occurs after memory allocation when USB protocol data is written to already-allocated sg pages.
How can this vulnerability impact me? :
This vulnerability can lead to unintended leakage of USB protocol data to user space applications via SCSI generic interfaces. This could potentially expose sensitive kernel memory contents or USB protocol information to unauthorized users or processes, which may be exploited for further attacks or information disclosure.
What immediate steps should I take to mitigate this vulnerability?
Apply the Linux kernel update that includes the fix for the USB storage memory leak vulnerability. This fix involves zeroing the Command Status Wrapper (CSW) data in the srb's transfer buffer immediately after validation to prevent USB protocol data leaks. Until the update is applied, avoid using untrusted USB storage devices to reduce exposure.