CVE-2025-71145 (GCVE-0-2025-71145)

Vulnerability from cvelistv5 – Published: 2026-01-23 13:39 – Updated: 2026-01-23 13:39
VLAI?
Title
usb: phy: isp1301: fix non-OF device reference imbalance
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF device reference imbalance A recent change fixing a device reference leak in a UDC driver introduced a potential use-after-free in the non-OF case as the isp1301_get_client() helper only increases the reference count for the returned I2C device in the OF case. Increment the reference count also for non-OF so that the caller can decrement it unconditionally. Note that this is inherently racy just as using the returned I2C device is since nothing is preventing the PHY driver from being unbound while in use.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 0c2b0e747010fa645342138d71339a0ecb823bb0 , < 43e58abad6c08c5f0943594126ef4cd6559aac0b (git)
Affected: 33c2e2a87313bc1afe9f7febbbb2014c431a2c5d , < 03bbdaa4da8c6ea0c8431a5011db188a07822c8a (git)
Affected: 8481323710062051b3c42bff94ee5b18a2b496ca , < 75c5d9bce072abbbc09b701a49869ac23c34a906 (git)
Affected: 8bd518ea03b81eb7b4a734b7b901866c448f6c07 , < 5d3df03f70547d4e3fc10ed4381c052eff51b157 (git)
Affected: cefaad839a384a72331aedad927b1944fb6943dc , < 7501ecfe3e5202490c2d13dc7e181203601fcd69 (git)
Affected: c84117912bddd9e5d87e68daf182410c98181407 , < b4b64fda4d30a83a7f00e92a0c8a1d47699609f3 (git)
Affected: 21c7c83d592e6335bfb6d65608da3726f976bad4 (git)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/phy/phy-isp1301.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "43e58abad6c08c5f0943594126ef4cd6559aac0b",
              "status": "affected",
              "version": "0c2b0e747010fa645342138d71339a0ecb823bb0",
              "versionType": "git"
            },
            {
              "lessThan": "03bbdaa4da8c6ea0c8431a5011db188a07822c8a",
              "status": "affected",
              "version": "33c2e2a87313bc1afe9f7febbbb2014c431a2c5d",
              "versionType": "git"
            },
            {
              "lessThan": "75c5d9bce072abbbc09b701a49869ac23c34a906",
              "status": "affected",
              "version": "8481323710062051b3c42bff94ee5b18a2b496ca",
              "versionType": "git"
            },
            {
              "lessThan": "5d3df03f70547d4e3fc10ed4381c052eff51b157",
              "status": "affected",
              "version": "8bd518ea03b81eb7b4a734b7b901866c448f6c07",
              "versionType": "git"
            },
            {
              "lessThan": "7501ecfe3e5202490c2d13dc7e181203601fcd69",
              "status": "affected",
              "version": "cefaad839a384a72331aedad927b1944fb6943dc",
              "versionType": "git"
            },
            {
              "lessThan": "b4b64fda4d30a83a7f00e92a0c8a1d47699609f3",
              "status": "affected",
              "version": "c84117912bddd9e5d87e68daf182410c98181407",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "21c7c83d592e6335bfb6d65608da3726f976bad4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/phy/phy-isp1301.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux"
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.10.248",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: phy: isp1301: fix non-OF device reference imbalance\n\nA recent change fixing a device reference leak in a UDC driver\nintroduced a potential use-after-free in the non-OF case as the\nisp1301_get_client() helper only increases the reference count for the\nreturned I2C device in the OF case.\n\nIncrement the reference count also for non-OF so that the caller can\ndecrement it unconditionally.\n\nNote that this is inherently racy just as using the returned I2C device\nis since nothing is preventing the PHY driver from being unbound while\nin use."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-01-23T13:39:17.857Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/43e58abad6c08c5f0943594126ef4cd6559aac0b"
        },
        {
          "url": "https://git.kernel.org/stable/c/03bbdaa4da8c6ea0c8431a5011db188a07822c8a"
        },
        {
          "url": "https://git.kernel.org/stable/c/75c5d9bce072abbbc09b701a49869ac23c34a906"
        },
        {
          "url": "https://git.kernel.org/stable/c/5d3df03f70547d4e3fc10ed4381c052eff51b157"
        },
        {
          "url": "https://git.kernel.org/stable/c/7501ecfe3e5202490c2d13dc7e181203601fcd69"
        },
        {
          "url": "https://git.kernel.org/stable/c/b4b64fda4d30a83a7f00e92a0c8a1d47699609f3"
        }
      ],
      "title": "usb: phy: isp1301: fix non-OF device reference imbalance",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-71145",
    "datePublished": "2026-01-23T13:39:17.857Z",
    "dateReserved": "2026-01-13T15:30:19.661Z",
    "dateUpdated": "2026-01-23T13:39:17.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-71145\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-01-23T14:16:12.873\",\"lastModified\":\"2026-01-26T15:03:51.687\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nusb: phy: isp1301: fix non-OF device reference imbalance\\n\\nA recent change fixing a device reference leak in a UDC driver\\nintroduced a potential use-after-free in the non-OF case as the\\nisp1301_get_client() helper only increases the reference count for the\\nreturned I2C device in the OF case.\\n\\nIncrement the reference count also for non-OF so that the caller can\\ndecrement it unconditionally.\\n\\nNote that this is inherently racy just as using the returned I2C device\\nis since nothing is preventing the PHY driver from being unbound while\\nin use.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/03bbdaa4da8c6ea0c8431a5011db188a07822c8a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/43e58abad6c08c5f0943594126ef4cd6559aac0b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5d3df03f70547d4e3fc10ed4381c052eff51b157\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7501ecfe3e5202490c2d13dc7e181203601fcd69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/75c5d9bce072abbbc09b701a49869ac23c34a906\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b4b64fda4d30a83a7f00e92a0c8a1d47699609f3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…