-
CVE-2025-38555
- EPSS 0.05%
- Veröffentlicht 19.08.2025 17:15:31
- Zuletzt bearbeitet 28.08.2025 15:15:53
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: usb: gadget : fix use-after-free in composite_dev_cleanup() 1. In func configfs_composite_bind() -> composite_os_desc_req_prepare(): if kmalloc fails, the pointer cdev->os_desc_req will be freed but not set to NULL. Then it will return a failure to the upper-level function. 2. in func configfs_composite_bind() -> composite_dev_cleanup(): it will checks whether cdev->os_desc_req is NULL. If it is not NULL, it will attempt to use it.This will lead to a use-after-free issue. BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0 Read of size 8 at addr 0000004827837a00 by task init/1 CPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1 kasan_report+0x188/0x1cc __asan_load8+0xb4/0xbc composite_dev_cleanup+0xf4/0x2c0 configfs_composite_bind+0x210/0x7ac udc_bind_to_driver+0xb4/0x1ec usb_gadget_probe_driver+0xec/0x21c gadget_dev_desc_UDC_store+0x264/0x27c
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
dba96dfa5a0f685b959dd28a52ac8dab0b805204
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
2db29235e900a084a656dea7e0939b0abb7bb897
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
8afb22aa063f706f3343707cdfb8cda4d021dd33
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
e624bf26127645a2f7821e73fdf6dc64bad07835
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
aada327a9f8028c573636fa60c0abc80fb8135c9
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
5f06ee9f9a3665d43133f125c17e5258a13f3963
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
e1be1f380c82a69f80c68c96a7cfe8759fb30355
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
Version <
151c0aa896c47a4459e07fee7d4843f44c1bb18e
Version
37a3a533429ef9b3cc9f15a656c19623f0e88df7
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.16
Status
affected
Version <
3.16
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.142 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|