CVE-2025-68822
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| alps | alps | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel related to the ALPS touchpad driver. It occurs because a delayed work item (dev3_register_work) can be scheduled after the associated data structure (alps_data) has been freed during device disconnection. The original code calls flush_workqueue() to wait for queued work to finish, but this does not block work items queued after the call. As a result, dev3_register_work may execute after the data it uses has been deallocated, leading to a race condition and potential memory corruption. The fix involves properly canceling the delayed work to prevent it from running after the data is freed.
How can this vulnerability impact me? :
This vulnerability can lead to use-after-free conditions, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges. This can compromise the security and reliability of the affected system, especially if exploited.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the alps driver includes the fix that adds disable_delayed_work_sync() in alps_disconnect(). This ensures that the dev3_register_work is properly canceled and prevented from executing after the alps_data structure has been deallocated, avoiding the use-after-free bug.