CVE-2025-68822

Source
https://cve.org/CVERecord?id=CVE-2025-68822
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68822.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68822
Downstream
Related
Published
2026-01-13T15:29:24.703Z
Modified
2026-03-23T05:29:38.772883Z
Summary
Input: alps - fix use-after-free bugs caused by dev3_register_work
Details

In the Linux kernel, the following vulnerability has been resolved:

Input: alps - fix use-after-free bugs caused by dev3registerwork

The dev3registerwork delayed work item is initialized within alpsreconnect() and scheduled upon receipt of the first bare PS/2 packet from an external PS/2 device connected to the ALPS touchpad. During device detachment, the original implementation calls flushworkqueue() in psmousedisconnect() to ensure completion of dev3registerwork. However, the flushworkqueue() in psmousedisconnect() only blocks and waits for work items that were already queued to the workqueue prior to its invocation. Any work items submitted after flushworkqueue() is called are not included in the set of tasks that the flush operation awaits. This means that after flushworkqueue() has finished executing, the dev3registerwork could still be scheduled. Although the psmouse state is set to PSMOUSECMDMODE in psmousedisconnect(), the scheduling of dev3registerwork remains unaffected.

The race condition can occur as follows:

CPU 0 (cleanup path) | CPU 1 (delayed work) psmousedisconnect() | psmousesetstate() | flushworkqueue() | alpsreportbareps2packet() alpsdisconnect() | psmousequeuework() kfree(priv); // FREE | alpsregisterbareps2mouse() | priv = containerof(work...); // USE | priv->dev3 // USE

Add disabledelayedworksync() in alpsdisconnect() to ensure that dev3registerwork is properly canceled and prevented from executing after the alps_data structure has been deallocated.

This bug is identified by static analysis.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68822.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
04aae283ba6a8cd4851d937bf9c6d6ef0361d794
Fixed
ed8c61b89be0c45f029228b2913d5cf7b5cda1a7
Fixed
a9c115e017b2c633d25bdfe6709dda6fc36f08c2
Fixed
bf40644ef8c8a288742fa45580897ed0e0289474

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68822.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68822.json"