CVE-2025-68312 (GCVE-0-2025-68312)
Vulnerability from cvelistv5
Published
2025-12-16 15:39
Modified
2025-12-16 15:39
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has not yet been scheduled when the usbnet device is unregistered. Therefore, executing free_netdev() results in the "free active object (kevent)" error reported here. 2. Another factor is that when calling usbnet_disconnect()->unregister_netdev(), if the usbnet device is up, ndo_stop() is executed to cancel the kevent. However, because the device is not up, ndo_stop() is not executed. The solution to this problem is to cancel the kevent before executing free_netdev().
Impacted products
Vendor Product Version
Linux Linux Version: 8b4588b8b00b299be16a35be67b331d8fdba03f3
Version: 135199a2edd459d2b123144efcd7f9bcd95128e4
Version: 635fd8953e4309b54ca6a81bed1d4a87668694f4
Version: a69e617e533edddf3fa3123149900f36e0a6dc74
Version: a69e617e533edddf3fa3123149900f36e0a6dc74
Version: a69e617e533edddf3fa3123149900f36e0a6dc74
Version: a69e617e533edddf3fa3123149900f36e0a6dc74
Version: a69e617e533edddf3fa3123149900f36e0a6dc74
Version: d2d6b530d89b0a912148018027386aa049f0a309
Version: e2a521a7dcc463c5017b4426ca0804e151faeff7
Version: 7f77dcbc030c2faa6d8e8a594985eeb34018409e
Version: d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f
Version: db3b738ae5f726204876f4303c49cfdf4311403f
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/usbnet.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "285d4b953f2ca03c358f986718dd89ee9bde632e",
              "status": "affected",
              "version": "8b4588b8b00b299be16a35be67b331d8fdba03f3",
              "versionType": "git"
            },
            {
              "lessThan": "88a38b135d69f5db9024ff6527232f1b51be8915",
              "status": "affected",
              "version": "135199a2edd459d2b123144efcd7f9bcd95128e4",
              "versionType": "git"
            },
            {
              "lessThan": "43005002b60ef3424719ecda16d124714b45da3b",
              "status": "affected",
              "version": "635fd8953e4309b54ca6a81bed1d4a87668694f4",
              "versionType": "git"
            },
            {
              "lessThan": "3a10619fdefd3051aeb14860e4d4335529b4e94d",
              "status": "affected",
              "version": "a69e617e533edddf3fa3123149900f36e0a6dc74",
              "versionType": "git"
            },
            {
              "lessThan": "9a579d6a39513069d298eee70770bbac8a148565",
              "status": "affected",
              "version": "a69e617e533edddf3fa3123149900f36e0a6dc74",
              "versionType": "git"
            },
            {
              "lessThan": "2ce1de32e05445d77fc056f6ff8339cfb78a5f84",
              "status": "affected",
              "version": "a69e617e533edddf3fa3123149900f36e0a6dc74",
              "versionType": "git"
            },
            {
              "lessThan": "5158fb8da162e3982940f30cd01ed77bdf42c6fc",
              "status": "affected",
              "version": "a69e617e533edddf3fa3123149900f36e0a6dc74",
              "versionType": "git"
            },
            {
              "lessThan": "420c84c330d1688b8c764479e5738bbdbf0a33de",
              "status": "affected",
              "version": "a69e617e533edddf3fa3123149900f36e0a6dc74",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d2d6b530d89b0a912148018027386aa049f0a309",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e2a521a7dcc463c5017b4426ca0804e151faeff7",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "7f77dcbc030c2faa6d8e8a594985eeb34018409e",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "d49bb8cf9bfaa06aa527eb30f1a52a071da2e32f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "db3b738ae5f726204876f4303c49cfdf4311403f",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/usb/usbnet.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.0"
            },
            {
              "lessThan": "6.0",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.302",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.247",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.197",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.159",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.117",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.58",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.17.*",
              "status": "unaffected",
              "version": "6.17.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.18",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.302",
                  "versionStartIncluding": "5.4.211",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.247",
                  "versionStartIncluding": "5.10.137",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.197",
                  "versionStartIncluding": "5.15.61",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.159",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.117",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.58",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17.8",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18",
                  "versionStartIncluding": "6.0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.326",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.14.291",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.19.256",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.18.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.19.2",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Prevents free active kevent\n\nThe root cause of this issue are:\n1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0);\nput the kevent work in global workqueue. However, the kevent has not yet\nbeen scheduled when the usbnet device is unregistered. Therefore, executing\nfree_netdev() results in the \"free active object (kevent)\" error reported\nhere.\n\n2. Another factor is that when calling usbnet_disconnect()-\u003eunregister_netdev(),\nif the usbnet device is up, ndo_stop() is executed to cancel the kevent.\nHowever, because the device is not up, ndo_stop() is not executed.\n\nThe solution to this problem is to cancel the kevent before executing\nfree_netdev()."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-16T15:39:43.174Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/285d4b953f2ca03c358f986718dd89ee9bde632e"
        },
        {
          "url": "https://git.kernel.org/stable/c/88a38b135d69f5db9024ff6527232f1b51be8915"
        },
        {
          "url": "https://git.kernel.org/stable/c/43005002b60ef3424719ecda16d124714b45da3b"
        },
        {
          "url": "https://git.kernel.org/stable/c/3a10619fdefd3051aeb14860e4d4335529b4e94d"
        },
        {
          "url": "https://git.kernel.org/stable/c/9a579d6a39513069d298eee70770bbac8a148565"
        },
        {
          "url": "https://git.kernel.org/stable/c/2ce1de32e05445d77fc056f6ff8339cfb78a5f84"
        },
        {
          "url": "https://git.kernel.org/stable/c/5158fb8da162e3982940f30cd01ed77bdf42c6fc"
        },
        {
          "url": "https://git.kernel.org/stable/c/420c84c330d1688b8c764479e5738bbdbf0a33de"
        }
      ],
      "title": "usbnet: Prevents free active kevent",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-68312",
    "datePublished": "2025-12-16T15:39:43.174Z",
    "dateReserved": "2025-12-16T14:48:05.294Z",
    "dateUpdated": "2025-12-16T15:39:43.174Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-68312\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-16T16:16:10.770\",\"lastModified\":\"2025-12-18T15:08:06.237\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusbnet: Prevents free active kevent\\n\\nThe root cause of this issue are:\\n1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0);\\nput the kevent work in global workqueue. However, the kevent has not yet\\nbeen scheduled when the usbnet device is unregistered. Therefore, executing\\nfree_netdev() results in the \\\"free active object (kevent)\\\" error reported\\nhere.\\n\\n2. Another factor is that when calling usbnet_disconnect()-\u003eunregister_netdev(),\\nif the usbnet device is up, ndo_stop() is executed to cancel the kevent.\\nHowever, because the device is not up, ndo_stop() is not executed.\\n\\nThe solution to this problem is to cancel the kevent before executing\\nfree_netdev().\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/285d4b953f2ca03c358f986718dd89ee9bde632e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2ce1de32e05445d77fc056f6ff8339cfb78a5f84\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3a10619fdefd3051aeb14860e4d4335529b4e94d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/420c84c330d1688b8c764479e5738bbdbf0a33de\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/43005002b60ef3424719ecda16d124714b45da3b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5158fb8da162e3982940f30cd01ed77bdf42c6fc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/88a38b135d69f5db9024ff6527232f1b51be8915\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9a579d6a39513069d298eee70770bbac8a148565\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…