CVE-2025-71145
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2026-01-23

Last updated on: 2026-02-26

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF device reference imbalance A recent change fixing a device reference leak in a UDC driver introduced a potential use-after-free in the non-OF case as the isp1301_get_client() helper only increases the reference count for the returned I2C device in the OF case. Increment the reference count also for non-OF so that the caller can decrement it unconditionally. Note that this is inherently racy just as using the returned I2C device is since nothing is preventing the PHY driver from being unbound while in use.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-23
Last Modified
2026-02-26
Generated
2026-05-07
AI Q&A
2026-01-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel From 5.10.248 (inc) to 5.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a use-after-free issue in the Linux kernel's isp1301 USB PHY driver. A recent fix for a device reference leak introduced a problem where the reference count for a non-OF (non-Open Firmware) I2C device was not incremented properly. This means that the device could be freed while still in use, leading to potential instability or crashes because the driver assumes the device is still valid when it might have been freed.


How can this vulnerability impact me? :

This vulnerability can cause system instability or crashes due to use-after-free conditions in the USB PHY driver. If exploited or triggered, it could lead to kernel errors or denial of service by causing the system to access freed memory improperly.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is fixed by incrementing the reference count for the I2C device in the non-OF case in the Linux kernel's isp1301 PHY driver. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix. There are no specific immediate commands or workarounds provided.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart