{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68289","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T14:48:05.292Z","datePublished":"2025-12-16T15:06:10.450Z","dateUpdated":"2026-05-11T21:50:17.025Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:50:17.025Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_eem: Fix memory leak in eem_unwrap\n\nThe existing code did not handle the failure case of usb_ep_queue in the\ncommand path, potentially leading to memory leaks.\n\nImprove error handling to free all allocated resources on usb_ep_queue\nfailure. This patch continues to use goto logic for error handling, as the\nexisting error handling is complex and not easily adaptable to auto-cleanup\nhelpers.\n\nkmemleak results:\n  unreferenced object 0xffffff895a512300 (size 240):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      kmem_cache_alloc+0x1b4/0x358\n      skb_clone+0x90/0xd8\n      eem_unwrap+0x1cc/0x36c\n  unreferenced object 0xffffff8a157f4000 (size 256):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      kmalloc_trace+0x48/0x140\n      dwc3_gadget_ep_alloc_request+0x58/0x11c\n      usb_ep_alloc_request+0x40/0xe4\n      eem_unwrap+0x204/0x36c\n  unreferenced object 0xffffff8aadbaac00 (size 128):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      __kmalloc+0x64/0x1a8\n      eem_unwrap+0x218/0x36c\n  unreferenced object 0xffffff89ccef3500 (size 64):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      kmalloc_trace+0x48/0x140\n      eem_unwrap+0x238/0x36c"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/function/f_eem.c"],"versions":[{"version":"3b545788505b2e2883aff13bdddeacaf88942a4f","lessThan":"a9985a88b2fc29fbe1657fe8518908e261d6889c","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"5a1628283cd9dccf1e44acfb74e77504f4dc7472","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"0ac07e476944a5e4c2b8b087dd167dec248c1bdf","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"41434488ca714ab15cb2a4d0378418d1be8052d2","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"e72c963177c708a167a7e17ed6c76320815157cf","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"0dea2e0069a7e9aa034696f8065945b7be6dd6b7","status":"affected","versionType":"git"},{"version":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706","lessThan":"e4f5ce990818d37930cd9fb0be29eee0553c59d9","status":"affected","versionType":"git"},{"version":"d55a236f1bab102e353ea5abb7b7b6ff7e847294","status":"affected","versionType":"git"},{"version":"8e275d3d5915a8f7db3786e3f84534bb48245f4c","status":"affected","versionType":"git"},{"version":"3680a6ff9a9ccd3c664663da04bef2534397d591","status":"affected","versionType":"git"},{"version":"d654be97e1b679616e3337b871a9ec8f31a88841","status":"affected","versionType":"git"},{"version":"8bdef7f21cb6e53c0ce3e1cbcb05975aa0dd0fe9","status":"affected","versionType":"git"},{"version":"77d7f071883cf2921a7547f82e41f15f7f860e35","status":"affected","versionType":"git"},{"version":"a55093941e38113dd6f5f5d5d2705fec3018f332","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/gadget/function/f_eem.c"],"versions":[{"version":"5.14","status":"affected"},{"version":"0","lessThan":"5.14","status":"unaffected","versionType":"semver"},{"version":"5.10.247","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.197","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.159","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.119","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.61","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.11","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.50","versionEndExcluding":"5.10.247"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"5.15.197"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.1.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.6.119"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.12.61"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.17.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.14","versionEndExcluding":"6.18"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.276"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.240"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.132"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.12.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a9985a88b2fc29fbe1657fe8518908e261d6889c"},{"url":"https://git.kernel.org/stable/c/5a1628283cd9dccf1e44acfb74e77504f4dc7472"},{"url":"https://git.kernel.org/stable/c/0ac07e476944a5e4c2b8b087dd167dec248c1bdf"},{"url":"https://git.kernel.org/stable/c/41434488ca714ab15cb2a4d0378418d1be8052d2"},{"url":"https://git.kernel.org/stable/c/e72c963177c708a167a7e17ed6c76320815157cf"},{"url":"https://git.kernel.org/stable/c/0dea2e0069a7e9aa034696f8065945b7be6dd6b7"},{"url":"https://git.kernel.org/stable/c/e4f5ce990818d37930cd9fb0be29eee0553c59d9"}],"title":"usb: gadget: f_eem: Fix memory leak in eem_unwrap","x_generator":{"engine":"bippy-1.2.0"}}}}