CVE-2025-68288
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
16/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: storage: Fix memory leak in USB bulk transport<br />
<br />
A kernel memory leak was identified by the &#39;ioctl_sg01&#39; test from Linux<br />
Test Project (LTP). The following bytes were mainly observed: 0x53425355.<br />
<br />
When USB storage devices incorrectly skip the data phase with status data,<br />
the code extracts/validates the CSW from the sg buffer, but fails to clear<br />
it afterwards. This leaves status protocol data in srb&#39;s transfer buffer,<br />
such as the US_BULK_CS_SIGN &#39;USBS&#39; signature observed here. Thus, this can<br />
lead to USB protocols leaks to user space through SCSI generic (/dev/sg*)<br />
interfaces, such as the one seen here when the LTP test requested 512 KiB.<br />
<br />
Fix the leak by zeroing the CSW data in srb&#39;s transfer buffer immediately<br />
after the validation of devices that skip data phase.<br />
<br />
Note: Differently from CVE-2018-1000204, which fixed a big leak by zero-<br />
ing pages at allocation time, this leak occurs after allocation, when USB<br />
protocol data is written to already-allocated sg pages.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0f18eac44c5668204bf6eebb01ddb369ac56932b
- https://git.kernel.org/stable/c/41e99fe2005182139b1058db71f0d241f8f0078c
- https://git.kernel.org/stable/c/467fec3cefbeb9e3ea80f457da9a5666a71ca0d0
- https://git.kernel.org/stable/c/4ba515dfff7eeca369ab85cdbb3f3b231c71720c
- https://git.kernel.org/stable/c/5b815ddb3f5560fac35b16de3a2a22d5f81c5993
- https://git.kernel.org/stable/c/83f0241959831586d9b6d47f6bd5d3dec8f43bf0
- https://git.kernel.org/stable/c/cb1401b5bcc2feb5b038fc4b512e5968b016e05e



