CVE-2025-68804
Description
In the Linux kernel, the following vulnerability has been resolved:
platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver
After unbinding the driver, another kthread cros_ec_console_log_work is still accessing the device, resulting an UAF and crash.
The driver doesn't unregister the EC device in .remove() which should shutdown sub-devices synchronously. Fix it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in the Linux kernel's Chrome OS EC ISHTP driver occurs when the driver is unbound while a worker thread still accesses the device.
Vulnerability
CVE-2025-68804 is a use-after-free (UAF) vulnerability in the Linux kernel's cros_ec_ishtp driver, part of the platform/chrome subsystem for Chrome OS Embedded Controller communication over Intel ISHTP. The root cause is that the driver's .remove() callback does not unregister the EC device, leaving a worker thread (cros_ec_console_log_work) still active and accessing freed device memory after the driver is unbound [1][2].
Exploitation
An attacker with the ability to unbind the driver (e.g., via sysfs or module removal) can trigger the race condition. No special privileges beyond local access are required; the attack surface is local, as the driver is part of the kernel's platform/chrome subsystem. The worker thread continues to run and dereferences freed pointers, leading to a crash or potential code execution [3].
Impact
Successful exploitation results in a kernel crash (denial of service) or, in worst-case scenarios, arbitrary code execution in kernel context. The vulnerability is rated with a CVSS score that reflects high severity due to the potential for system compromise.
Mitigation
The fix is included in the Linux kernel stable updates. The commit ensures that the EC device is properly unregistered in the .remove() path, which synchronously shuts down sub-devices and stops the worker thread before freeing memory [1][2][3]. Users should apply the latest kernel updates from their distribution updates to mitigate the issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/24a2062257bbdfc831de5ed21c27b04b5bdf2437nvd
- git.kernel.org/stable/c/27037916db38e6b78a0242031d3b93d997b84020nvd
- git.kernel.org/stable/c/393b8f9bedc7806acb9c47cefdbdb223b4b6164bnvd
- git.kernel.org/stable/c/4701493ba37654b3c38b526f6591cf0b02aa172fnvd
- git.kernel.org/stable/c/8dc1f5a85286290dbf04dd5951d020570f49779bnvd
- git.kernel.org/stable/c/944edca81e7aea15f83cf9a13a6ab67f711e8abdnvd
- git.kernel.org/stable/c/e1da6e399df976dd04c7c73ec008bc81da368a95nvd
News mentions
0No linked articles in our index yet.