U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-68312 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has not yet been scheduled when the usbnet device is unregistered. Therefore, executing free_netdev() results in the "free active object (kevent)" error reported here. 2. Another factor is that when calling usbnet_disconnect()->unregister_netdev(), if the usbnet device is up, ndo_stop() is executed to cancel the kevent. However, because the device is not up, ndo_stop() is not executed. The solution to this problem is to cancel the kevent before executing free_netdev().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/285d4b953f2ca03c358f986718dd89ee9bde632e kernel.org
https://git.kernel.org/stable/c/2ce1de32e05445d77fc056f6ff8339cfb78a5f84 kernel.org
https://git.kernel.org/stable/c/3a10619fdefd3051aeb14860e4d4335529b4e94d kernel.org
https://git.kernel.org/stable/c/420c84c330d1688b8c764479e5738bbdbf0a33de kernel.org
https://git.kernel.org/stable/c/43005002b60ef3424719ecda16d124714b45da3b kernel.org
https://git.kernel.org/stable/c/5158fb8da162e3982940f30cd01ed77bdf42c6fc kernel.org
https://git.kernel.org/stable/c/88a38b135d69f5db9024ff6527232f1b51be8915 kernel.org
https://git.kernel.org/stable/c/9a579d6a39513069d298eee70770bbac8a148565 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-68312
NVD Published Date:
12/16/2025
NVD Last Modified:
12/16/2025
Source:
kernel.org