{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68282","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T14:48:05.291Z","datePublished":"2025-12-16T15:06:04.332Z","dateUpdated":"2026-05-11T21:50:08.718Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:50:08.718Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: udc: fix use-after-free in usb_gadget_state_work\n\nA race condition during gadget teardown can lead to a use-after-free\nin usb_gadget_state_work(), as reported by KASAN:\n\n  BUG: KASAN: invalid-access in sysfs_notify+0x2c/0xd0\n  Workqueue: events usb_gadget_state_work\n\nThe fundamental race occurs because a concurrent event (e.g., an\ninterrupt) can call usb_gadget_set_state() and schedule gadget->work\nat any time during the cleanup process in usb_del_gadget().\n\nCommit 399a45e5237c (\"usb: gadget: core: flush gadget workqueue after\ndevice removal\") attempted to fix this by moving flush_work() to after\ndevice_del(). However, this does not fully solve the race, as a new\nwork item can still be scheduled *after* flush_work() completes but\nbefore the gadget's memory is freed, leading to the same use-after-free.\n\nThis patch fixes the race condition robustly by introducing a 'teardown'\nflag and a 'state_lock' spinlock to the usb_gadget struct. The flag is\nset during cleanup in usb_del_gadget() *before* calling flush_work() to\nprevent any new work from being scheduled once cleanup has commenced.\nThe scheduling site, usb_gadget_set_state(), now checks this flag under\nthe lock before queueing the work, thus safely closing the race window."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/udc/core.c","include/linux/usb/gadget.h"],"versions":[{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"dddc944d65169b552e09cb54e3ed4fbb9ea26416","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"eee16f3ff08e759ea828bdf7dc1c0ef2f22134f5","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"c12a0c3ef815ddd67e47f9c819f9fe822fed5467","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"f02a412c0a18f02f0f91b0a3d9788315a721b7fd","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"10014310193cf6736c1aeb4105c5f4a0818d0c65","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"3b32caa73d135eea8fb9cabb45e9fc64c5a3ecb9","status":"affected","versionType":"git"},{"version":"5702f75375aa9ecf8ad3431aef3fe6ce8c8dbd15","lessThan":"baeb66fbd4201d1c4325074e78b1f557dff89b5b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/udc/core.c","include/linux/usb/gadget.h"],"versions":[{"version":"3.12","status":"affected"},{"version":"0","lessThan":"3.12","status":"unaffected","versionType":"semver"},{"version":"5.10.248","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.198","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.159","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.119","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.61","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.11","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"5.10.248"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"5.15.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.1.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.6.119"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.12.61"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.17.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12","versionEndExcluding":"6.18"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dddc944d65169b552e09cb54e3ed4fbb9ea26416"},{"url":"https://git.kernel.org/stable/c/eee16f3ff08e759ea828bdf7dc1c0ef2f22134f5"},{"url":"https://git.kernel.org/stable/c/c12a0c3ef815ddd67e47f9c819f9fe822fed5467"},{"url":"https://git.kernel.org/stable/c/f02a412c0a18f02f0f91b0a3d9788315a721b7fd"},{"url":"https://git.kernel.org/stable/c/10014310193cf6736c1aeb4105c5f4a0818d0c65"},{"url":"https://git.kernel.org/stable/c/3b32caa73d135eea8fb9cabb45e9fc64c5a3ecb9"},{"url":"https://git.kernel.org/stable/c/baeb66fbd4201d1c4325074e78b1f557dff89b5b"}],"title":"usb: gadget: udc: fix use-after-free in usb_gadget_state_work","x_generator":{"engine":"bippy-1.2.0"}}}}