CVE-2025-68781
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's fsl-usb PHY driver. It occurs because a delayed work item (otg_event) can still be pending or executing when the device is removed and its memory is freed. Specifically, the delayed work function accesses memory that has already been deallocated, leading to undefined behavior. The issue arises from a race condition between device removal and delayed work execution. The fix involves canceling and synchronizing the delayed work before freeing the memory to prevent this use-after-free.
How can this vulnerability impact me? :
This vulnerability can lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the use-after-free condition in the USB PHY driver during device removal.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Linux kernel version you are using includes the fix that calls disable_delayed_work_sync() in fsl_otg_remove() before deallocating the fsl_otg structure. This prevents the use-after-free by properly canceling and completing the delayed work before memory deallocation. Updating your kernel to a version with this fix applied is the immediate step to take.