CVE-2025-68312
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's usbnet driver. When the usbnet device is probed, a kevent work is scheduled in the global workqueue, but it may not be scheduled before the device is unregistered. If free_netdev() is called while the kevent is still active, it causes a 'free active object (kevent)' error. Additionally, if the device is not up during disconnect, the kevent cancellation function (ndo_stop) is not called, leaving the kevent active. The fix involves cancelling the kevent before calling free_netdev().
How can this vulnerability impact me? :
This vulnerability can lead to a use-after-free or double-free error in the kernel, potentially causing system instability, crashes, or denial of service. It may affect the reliability of the usbnet device driver and could be exploited to disrupt normal device operation.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to ensure that the kevent is cancelled before executing free_netdev() when handling usbnet devices. This involves applying the patch or update that fixes the issue by preventing free active kevent errors during usbnet device unregistration.