CVE-2025-68194

Source
https://cve.org/CVERecord?id=CVE-2025-68194
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68194.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68194
Downstream
Related
Published
2025-12-16T13:43:20.525Z
Modified
2026-03-20T12:46:16.408386Z
Summary
media: imon: make send_packet() more robust
Details

In the Linux kernel, the following vulnerability has been resolved:

media: imon: make send_packet() more robust

syzbot is reporting that imon has three problems which result in hung tasks due to forever holding device lock [1].

First problem is that when usbrxcallbackintf0() once got -EPROTO error after ictx->devpresentintf0 became true, usbrxcallbackintf0() resubmits urb after printk(), and resubmitted urb causes usbrxcallback_intf0() to again get -EPROTO error. This results in printk() flooding (RCU stalls).

Alan Stern commented [2] that

In theory it's okay to resubmit if the driver has a robust error-recovery scheme (such as giving up after some fixed limit on the number of errors or after some fixed time has elapsed, perhaps with a time delay to prevent a flood of errors). Most drivers don't bother to do this; they simply give up right away. This makes them more vulnerable to short-term noise interference during USB transfers, but in reality such interference is quite rare. There's nothing really wrong with giving up right away.

but imon has a poor error-recovery scheme which just retries forever; this behavior should be fixed.

Since I'm not sure whether it is safe for imon users to give up upon any error code, this patch takes care of only union of error codes chosen from modules in drivers/media/rc/ directory which handle -EPROTO error (i.e. ir_toy, mceusb and igorplugusb).

Second problem is that when usbrxcallbackintf0() once got -EPROTO error before ictx->devpresentintf0 becomes true, usbrxcallbackintf0() always resubmits urb due to commit 8791d63af0cf ("[media] imon: don't wedge hardware after early callbacks"). Move the ictx->devpresentintf0 test introduced by commit 6f6b90c9231a ("[media] imon: don't parse scancodes until intf configured") to immediately before imonincomingpacket(), or the first problem explained above happens without printk() flooding (i.e. hung task).

Third problem is that when usbrxcallbackintf0() is not called for some reason (e.g. flaky hardware; the reproducer for this problem sometimes prevents usbrxcallbackintf0() from being called), waitforcompletioninterruptible() in sendpacket() never returns (i.e. hung task). As a workaround for such situation, change send_packet() to wait for completion with timeout of 10 seconds.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68194.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
21677cfc562a27e099719d413287bc8d1d24deb7
Fixed
519737af11c03590819a6eec2ad532cfdb87ea63
Fixed
f58ab83b7b7133e6baefe03a46846c4f6ce45e2f
Fixed
26f6a1dd5d81ad61a875a747698da6f27abf389b
Fixed
667afd4681781f60a644cd0d2ee6c59cb1c36208
Fixed
8231e80118463be5598daaf266c1c83650f1948b
Fixed
0213e4175abbb9dfcbf7c197e3817d527f459ad5
Fixed
f7f3ecb4934fff782fa9bb1cd16e2290c041b22d
Fixed
eecd203ada43a4693ce6fdd3a58ae10c7819252c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68194.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.35
Fixed
5.4.302
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.117
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.58
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68194.json"