๐Ÿ” CVE Alert

CVE-2025-68376

UNKNOWN 0.0

coresight: ETR: Fix ETR buffer use-after-free issue

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: coresight: ETR: Fix ETR buffer use-after-free issue When ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed and enabled again, currently sysfs_buf will point to the newly allocated memory(buf_new) and free the old memory(buf_old). But the etr_buf that is being used by the ETR remains pointed to buf_old, not updated to buf_new. In this case, it will result in a memory use-after-free issue. Fix this by checking ETR's mode before updating and releasing buf_old, if the mode is CS_MODE_SYSFS, then skip updating and releasing it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
bd2767ec3df2775bc336f441f9068a989ccb919d < 70acbc9c77686b7a521af6d7a543dcd9c324cf07 bd2767ec3df2775bc336f441f9068a989ccb919d < cda077a19f5c8d6ec61e5b97deca203d95e3a422 bd2767ec3df2775bc336f441f9068a989ccb919d < 35501ac3c7d40a7bb9568c2f89d6b56beaf9bed3 fdd3ceb0001da6768bede9779a0190a42e65c404
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/70acbc9c77686b7a521af6d7a543dcd9c324cf07 git.kernel.org: https://git.kernel.org/stable/c/cda077a19f5c8d6ec61e5b97deca203d95e3a422 git.kernel.org: https://git.kernel.org/stable/c/35501ac3c7d40a7bb9568c2f89d6b56beaf9bed3