-
CVE-2025-38448
- EPSS 0.04%
- Veröffentlicht 25.07.2025 16:15:30
- Zuletzt bearbeitet 29.07.2025 14:14:55
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix race condition in TTY wakeup A race condition occurs when gs_start_io() calls either gs_start_rx() or gs_start_tx(), as those functions briefly drop the port_lock for usb_ep_queue(). This allows gs_close() and gserial_disconnect() to clear port.tty and port_usb, respectively. Use the null-safe TTY Port helper function to wake up TTY. Example CPU1: CPU2: gserial_connect() // lock gs_close() // await lock gs_start_rx() // unlock usb_ep_queue() gs_close() // lock, reset port.tty and unlock gs_start_rx() // lock tty_wakeup() // NPE
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
18d58a467ccf011078352d91b4d6a0108c7318e8
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
d43657b59f36e88289a6066f15bc9a80df5014eb
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
a5012673d49788f16bb4e375b002d7743eb642d9
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
ee8d688e2ba558f3bb8ac225113740be5f335417
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
c6eb4a05af3d0ba3bc4e8159287722fb9abc6359
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
abf3620cba68e0e51e5c21054ce4f925f75b3661
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
c8c80a3a35c2e3488409de2d5376ef7e662a2bf5
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
Version <
c529c3730bd09115684644e26bf01ecbd7e2c2c9
Version
35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.5
Status
affected
Version <
3.5
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.296
Status
unaffected
Version <=
5.10.*
Version
5.10.240
Status
unaffected
Version <=
5.15.*
Version
5.15.189
Status
unaffected
Version <=
6.1.*
Version
6.1.146
Status
unaffected
Version <=
6.6.*
Version
6.6.99
Status
unaffected
Version <=
6.12.*
Version
6.12.39
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|