๐Ÿ” CVE Alert

CVE-2025-21928

HIGH 7.8

HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can experience a random crash a few minutes after the driver is removed. This issue occurs due to improper handling of memory freeing in the ishtp_hid_remove() function. The function currently frees the `driver_data` directly within the loop that destroys the HID devices, which can lead to accessing freed memory. Specifically, `hid_destroy_device()` uses `driver_data` when it calls `hid_ishtp_set_feature()` to power off the sensor, so freeing `driver_data` beforehand can result in accessing invalid memory. This patch resolves the issue by storing the `driver_data` in a temporary variable before calling `hid_destroy_device()`, and then freeing the `driver_data` after the device is destroyed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < 0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < d3faae7f42181865c799d88c5054176f38ae4625 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < 01b18a330cda61cc21423a7d1af92cf31ded8f60 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < 560f4d1299342504a6ab8a47f575b5e6b8345ada 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < dea6a349bcaf243fff95dfd0428a26be6a0fb44e 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9 0b28cb4bcb17dcb5fe0763fc3e1a94398b8f6cf6 < 07583a0010696a17fb0942e0b499a62785c5fc9f
Linux / Linux
4.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0c1fb475ef999d6c22fc3f963fdf20cb3ed1b03d git.kernel.org: https://git.kernel.org/stable/c/d3faae7f42181865c799d88c5054176f38ae4625 git.kernel.org: https://git.kernel.org/stable/c/01b18a330cda61cc21423a7d1af92cf31ded8f60 git.kernel.org: https://git.kernel.org/stable/c/cf1a6015d2f6b1f0afaa0fd6a0124ff2c7943394 git.kernel.org: https://git.kernel.org/stable/c/560f4d1299342504a6ab8a47f575b5e6b8345ada git.kernel.org: https://git.kernel.org/stable/c/dea6a349bcaf243fff95dfd0428a26be6a0fb44e git.kernel.org: https://git.kernel.org/stable/c/eb0695d87a81e7c1f0509b7d8ee7c65fbc26aec9 git.kernel.org: https://git.kernel.org/stable/c/07583a0010696a17fb0942e0b499a62785c5fc9f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html