CVE-2025-71145
📋 TL;DR
A use-after-free vulnerability in the Linux kernel's USB PHY driver (isp1301) allows potential kernel memory corruption when handling non-OF (Open Firmware) I2C device references. This affects Linux systems using the isp1301 USB PHY driver, primarily embedded devices and servers with specific USB hardware configurations.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic, system crash, or potential privilege escalation leading to full system compromise if an attacker can trigger the use-after-free condition.
Likely Case
System instability, kernel crashes, or denial of service when USB devices are connected/disconnected under specific timing conditions.
If Mitigated
Minimal impact with proper kernel hardening, as exploitation requires specific hardware and timing conditions.
🎯 Exploit Status
Exploitation requires specific hardware (isp1301 PHY), precise timing to trigger race condition, and kernel memory manipulation knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commit 75c5d9bce072abbbc09b701a49869ac23c34a906 or later
Vendor Advisory: https://git.kernel.org/stable/c/75c5d9bce072abbbc09b701a49869ac23c34a906
Restart Required: Yes
Instructions:
1. Update to latest stable kernel from your distribution. 2. For custom kernels, apply commit 75c5d9bce072abbbc09b701a49869ac23c34a906. 3. Rebuild and install kernel. 4. Reboot system.
🔧 Temporary Workarounds
Disable isp1301 driver module
linuxPrevent loading of vulnerable driver if not needed
echo 'blacklist isp1301' >> /etc/modprobe.d/blacklist.conf
rmmod isp1301
🧯 If You Can't Patch
- Restrict physical USB access to prevent triggering the race condition
- Implement strict user privilege controls to limit who can interact with USB devices
🔍 How to Verify
Check if Vulnerable:
Check if isp1301 module is loaded: lsmod | grep isp1301 AND check kernel version against affected commit range
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes fix commit: git log --oneline | grep '75c5d9bce072abbbc09b701a49869ac23c34a906'
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- USB subsystem errors in dmesg
- System crash logs
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("isp1301" OR "use-after-free" OR "general protection fault")
🔗 References
- https://git.kernel.org/stable/c/03bbdaa4da8c6ea0c8431a5011db188a07822c8a
- https://git.kernel.org/stable/c/43e58abad6c08c5f0943594126ef4cd6559aac0b
- https://git.kernel.org/stable/c/5d3df03f70547d4e3fc10ed4381c052eff51b157
- https://git.kernel.org/stable/c/7501ecfe3e5202490c2d13dc7e181203601fcd69
- https://git.kernel.org/stable/c/75c5d9bce072abbbc09b701a49869ac23c34a906
- https://git.kernel.org/stable/c/b4b64fda4d30a83a7f00e92a0c8a1d47699609f3