CVE-2025-68287

Source
https://cve.org/CVERecord?id=CVE-2025-68287
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68287.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68287
Downstream
Related
Published
2025-12-16T15:06:08.711Z
Modified
2026-03-13T04:05:33.175461Z
Summary
usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Fix race condition between concurrent dwc3removerequests() call paths

This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking dwc3_remove_requests(), leading to premature freeing of USB requests and subsequent crashes.

Three distinct execution paths interact with dwc3_remove_requests(): Path 1: Triggered via dwc3_gadget_reset_interrupt() during USB reset handling. The call stack includes: - dwc3_ep0_reset_state() - dwc3_ep0_stall_and_restart() - dwc3_ep0_out_start() - dwc3_remove_requests() - dwc3_gadget_del_and_unmap_request()

Path 2: Also initiated from dwc3_gadget_reset_interrupt(), but through dwc3_stop_active_transfers(). The call stack includes: - dwc3_stop_active_transfers() - dwc3_remove_requests() - dwc3_gadget_del_and_unmap_request()

Path 3: Occurs independently during adb root execution, which triggers USB function unbind and bind operations. The sequence includes: - gserial_disconnect() - usb_ep_disable() - dwc3_gadget_ep_disable() - dwc3_remove_requests() with -ESHUTDOWN status

Path 3 operates asynchronously and lacks synchronization with Paths 1 and 2. When Path 3 completes, it disables endpoints and frees 'out' requests. If Paths 1 or 2 are still processing these requests, accessing freed memory leads to a crash due to use-after-free conditions.

To fix this added check for request completion and skip processing if already completed and added the request status for ep0 while queue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68287.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
72246da40f3719af3bfd104a2365b32537c27d83
Fixed
467add9db13219101f14b6cc5477998b4aaa5fe2
Fixed
67192e8cb7f941b5bba91e4bb290683576ce1607
Fixed
47de14d741cc4057046c9e2f33df1f7828254e6c
Fixed
afc0e34f161ce61ad351303c46eb57bd44b8b090
Fixed
7cfb62888eba292fa35cd9ddbd28ce595f60e139
Fixed
fa5eaf701e576880070b60922200557ae4aa54e1
Fixed
e4037689a366743c4233966f0e74bc455820d316

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68287.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.2.0
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.119
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.61
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.11

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68287.json"