CVE-2025-68331
Use-After-Free Vulnerability in Linux USB UAS Causes System Panic
Publication date: 2025-12-22
Last updated on: 2025-12-22
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's USB Attached SCSI (UAS) driver. When a UAS device is unplugged during an ongoing data transfer, the system may panic due to an invalid memory access. Specifically, the issue arises because the driver attempts to unmap DMA memory for USB Request Blocks (URBs) after the associated scatter-gather (sg) data structure has already been freed, leading to access of a zero dma_address field. This happens during error handling when some URBs have been submitted successfully but the device is removed before all URBs complete. The patch changes the error handling to delay completion callbacks until all pending URBs are finalized, preventing the invalid memory access and system panic.
How can this vulnerability impact me? :
This vulnerability can cause a system panic (crash) if a UAS device is unplugged during data transfer. This can lead to loss of data, system instability, and potential downtime as the kernel crashes and requires a reboot. It affects system reliability and availability when using USB Attached SCSI devices.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the urb unmapping issue in the uas driver. This patch modifies error handling in uas_submit_urbs() to prevent system panic when a UAS device is removed during ongoing data transfer. Avoid unplugging UAS devices during active data transfers until the patch is applied.