-

CVE-2025-38448

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Fix race condition in TTY wakeup

A race condition occurs when gs_start_io() calls either gs_start_rx() or
gs_start_tx(), as those functions briefly drop the port_lock for
usb_ep_queue(). This allows gs_close() and gserial_disconnect() to clear
port.tty and port_usb, respectively.

Use the null-safe TTY Port helper function to wake up TTY.

Example
  CPU1:			      CPU2:
  gserial_connect() // lock
  			      gs_close() // await lock
  gs_start_rx()     // unlock
  usb_ep_queue()
  			      gs_close() // lock, reset port.tty and unlock
  gs_start_rx()     // lock
  tty_wakeup()      // NPE

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 18d58a467ccf011078352d91b4d6a0108c7318e8
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < d43657b59f36e88289a6066f15bc9a80df5014eb
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < a5012673d49788f16bb4e375b002d7743eb642d9
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < ee8d688e2ba558f3bb8ac225113740be5f335417
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < c6eb4a05af3d0ba3bc4e8159287722fb9abc6359
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < abf3620cba68e0e51e5c21054ce4f925f75b3661
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < c8c80a3a35c2e3488409de2d5376ef7e662a2bf5
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
Version < c529c3730bd09115684644e26bf01ecbd7e2c2c9
Version 35f95fd7f234d2b58803bab6f6ebd6bb988050a2
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.5
Status affected
Version < 3.5
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.296
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.189
Status unaffected
Version <= 6.1.*
Version 6.1.146
Status unaffected
Version <= 6.6.*
Version 6.6.99
Status unaffected
Version <= 6.12.*
Version 6.12.39
Status unaffected
Version <= 6.15.*
Version 6.15.7
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String