{"id":"CVE-2025-68289","summary":"usb: gadget: f_eem: Fix memory leak in eem_unwrap","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_eem: Fix memory leak in eem_unwrap\n\nThe existing code did not handle the failure case of usb_ep_queue in the\ncommand path, potentially leading to memory leaks.\n\nImprove error handling to free all allocated resources on usb_ep_queue\nfailure. This patch continues to use goto logic for error handling, as the\nexisting error handling is complex and not easily adaptable to auto-cleanup\nhelpers.\n\nkmemleak results:\n  unreferenced object 0xffffff895a512300 (size 240):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      kmem_cache_alloc+0x1b4/0x358\n      skb_clone+0x90/0xd8\n      eem_unwrap+0x1cc/0x36c\n  unreferenced object 0xffffff8a157f4000 (size 256):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      kmalloc_trace+0x48/0x140\n      dwc3_gadget_ep_alloc_request+0x58/0x11c\n      usb_ep_alloc_request+0x40/0xe4\n      eem_unwrap+0x204/0x36c\n  unreferenced object 0xffffff8aadbaac00 (size 128):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      __kmalloc+0x64/0x1a8\n      eem_unwrap+0x218/0x36c\n  unreferenced object 0xffffff89ccef3500 (size 64):\n    backtrace:\n      slab_post_alloc_hook+0xbc/0x3a4\n      __kmem_cache_alloc_node+0x1b4/0x2dc\n      kmalloc_trace+0x48/0x140\n      eem_unwrap+0x238/0x36c","modified":"2026-04-16T04:32:08.496797039Z","published":"2025-12-16T15:06:10.450Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68289.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0ac07e476944a5e4c2b8b087dd167dec248c1bdf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0dea2e0069a7e9aa034696f8065945b7be6dd6b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41434488ca714ab15cb2a4d0378418d1be8052d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a1628283cd9dccf1e44acfb74e77504f4dc7472"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a9985a88b2fc29fbe1657fe8518908e261d6889c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4f5ce990818d37930cd9fb0be29eee0553c59d9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e72c963177c708a167a7e17ed6c76320815157cf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68289.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68289"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3b545788505b2e2883aff13bdddeacaf88942a4f"},{"fixed":"a9985a88b2fc29fbe1657fe8518908e261d6889c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4249d6fbc10fd997abdf8a1ea49c0389a0edf706"},{"fixed":"5a1628283cd9dccf1e44acfb74e77504f4dc7472"},{"fixed":"0ac07e476944a5e4c2b8b087dd167dec248c1bdf"},{"fixed":"41434488ca714ab15cb2a4d0378418d1be8052d2"},{"fixed":"e72c963177c708a167a7e17ed6c76320815157cf"},{"fixed":"0dea2e0069a7e9aa034696f8065945b7be6dd6b7"},{"fixed":"e4f5ce990818d37930cd9fb0be29eee0553c59d9"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"d55a236f1bab102e353ea5abb7b7b6ff7e847294"},{"last_affected":"8e275d3d5915a8f7db3786e3f84534bb48245f4c"},{"last_affected":"3680a6ff9a9ccd3c664663da04bef2534397d591"},{"last_affected":"d654be97e1b679616e3337b871a9ec8f31a88841"},{"last_affected":"8bdef7f21cb6e53c0ce3e1cbcb05975aa0dd0fe9"},{"last_affected":"77d7f071883cf2921a7547f82e41f15f7f860e35"},{"last_affected":"a55093941e38113dd6f5f5d5d2705fec3018f332"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68289.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.14.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.6.119"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.12.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.17.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68289.json"}}],"schema_version":"1.7.5"}