CVE-2025-68289
中文标题:
(暂无数据)
英文标题:
usb: gadget: f_eem: Fix memory leak in eem_unwrap
漏洞描述
中文描述:
(暂无数据)
英文描述:
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_eem: Fix memory leak in eem_unwrap The existing code did not handle the failure case of usb_ep_queue in the command path, potentially leading to memory leaks. Improve error handling to free all allocated resources on usb_ep_queue failure. This patch continues to use goto logic for error handling, as the existing error handling is complex and not easily adaptable to auto-cleanup helpers. kmemleak results: unreferenced object 0xffffff895a512300 (size 240): backtrace: slab_post_alloc_hook+0xbc/0x3a4 kmem_cache_alloc+0x1b4/0x358 skb_clone+0x90/0xd8 eem_unwrap+0x1cc/0x36c unreferenced object 0xffffff8a157f4000 (size 256): backtrace: slab_post_alloc_hook+0xbc/0x3a4 __kmem_cache_alloc_node+0x1b4/0x2dc kmalloc_trace+0x48/0x140 dwc3_gadget_ep_alloc_request+0x58/0x11c usb_ep_alloc_request+0x40/0xe4 eem_unwrap+0x204/0x36c unreferenced object 0xffffff8aadbaac00 (size 128): backtrace: slab_post_alloc_hook+0xbc/0x3a4 __kmem_cache_alloc_node+0x1b4/0x2dc __kmalloc+0x64/0x1a8 eem_unwrap+0x218/0x36c unreferenced object 0xffffff89ccef3500 (size 64): backtrace: slab_post_alloc_hook+0xbc/0x3a4 __kmem_cache_alloc_node+0x1b4/0x2dc kmalloc_trace+0x48/0x140 eem_unwrap+0x238/0x36c
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Linux | Linux | d55a236f1bab102e353ea5abb7b7b6ff7e847294 | - | - |
cpe:2.3:a:linux:linux:d55a236f1bab102e353ea5abb7b7b6ff7e847294:*:*:*:*:*:*:*
|
| Linux | Linux | 8e275d3d5915a8f7db3786e3f84534bb48245f4c | - | - |
cpe:2.3:a:linux:linux:8e275d3d5915a8f7db3786e3f84534bb48245f4c:*:*:*:*:*:*:*
|
| Linux | Linux | 3680a6ff9a9ccd3c664663da04bef2534397d591 | - | - |
cpe:2.3:a:linux:linux:3680a6ff9a9ccd3c664663da04bef2534397d591:*:*:*:*:*:*:*
|
| Linux | Linux | d654be97e1b679616e3337b871a9ec8f31a88841 | - | - |
cpe:2.3:a:linux:linux:d654be97e1b679616e3337b871a9ec8f31a88841:*:*:*:*:*:*:*
|
| Linux | Linux | 8bdef7f21cb6e53c0ce3e1cbcb05975aa0dd0fe9 | - | - |
cpe:2.3:a:linux:linux:8bdef7f21cb6e53c0ce3e1cbcb05975aa0dd0fe9:*:*:*:*:*:*:*
|
| Linux | Linux | 77d7f071883cf2921a7547f82e41f15f7f860e35 | - | - |
cpe:2.3:a:linux:linux:77d7f071883cf2921a7547f82e41f15f7f860e35:*:*:*:*:*:*:*
|
| Linux | Linux | a55093941e38113dd6f5f5d5d2705fec3018f332 | - | - |
cpe:2.3:a:linux:linux:a55093941e38113dd6f5f5d5d2705fec3018f332:*:*:*:*:*:*:*
|
| Linux | Linux | 5.14 | - | - |
cpe:2.3:a:linux:linux:5.14:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
NOT_EXTRACTED
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68289 |
2025-12-19 03:24:49 | 2026-01-12 02:12:29 |
| NVD | nvd_CVE-2025-68289 |
2025-12-19 03:25:39 | 2026-01-12 02:28:13 |
版本与语言
安全公告
变更历史
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']