-

CVE-2025-40092

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_ncm: Refactor bind path to use __free()

After an bind/unbind cycle, the ncm->notify_req is left stale. If a
subsequent bind fails, the unified error label attempts to free this
stale request, leading to a NULL pointer dereference when accessing
ep->ops->free_request.

Refactor the error handling in the bind path to use the __free()
automatic cleanup mechanism.

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
Call trace:
 usb_ep_free_request+0x2c/0xec
 ncm_bind+0x39c/0x3dc
 usb_add_function+0xcc/0x1f0
 configfs_composite_bind+0x468/0x588
 gadget_bind_driver+0x104/0x270
 really_probe+0x190/0x374
 __driver_probe_device+0xa0/0x12c
 driver_probe_device+0x3c/0x218
 __device_attach_driver+0x14c/0x188
 bus_for_each_drv+0x10c/0x168
 __device_attach+0xfc/0x198
 device_initial_probe+0x14/0x24
 bus_probe_device+0x94/0x11c
 device_add+0x268/0x48c
 usb_add_gadget+0x198/0x28c
 dwc3_gadget_init+0x700/0x858
 __dwc3_set_mode+0x3cc/0x664
 process_scheduled_works+0x1d8/0x488
 worker_thread+0x244/0x334
 kthread+0x114/0x1bc
 ret_from_fork+0x10/0x20
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 185193a4714aa9c78437a7a1858fbe5771f0f45c
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
Version < f37de8dec6a4c379b4b8486003a1de00ff8cff3b
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
Version < 1cde4516295a030cb8ab4c93114ca3b6c3c6a1e2
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
Version < d3fe7143928d8dfa2ec7bac9f906b48bc75b98ee
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
Version < ed78f4d6079d872432b1ed54f155ef61965d3137
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
Version < 75a5b8d4ddd4eb6b16cb0b475d14ff4ae64295ef
Version 9f6ce4240a2bf456402c15c06768059e5973f28c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.38
Status affected
Version < 2.6.38
Version 0
Status unaffected
Version <= 5.15.*
Version 5.15.196
Status unaffected
Version <= 6.1.*
Version 6.1.158
Status unaffected
Version <= 6.6.*
Version 6.6.114
Status unaffected
Version <= 6.12.*
Version 6.12.55
Status unaffected
Version <= 6.17.*
Version 6.17.5
Status unaffected
Version <= *
Version 6.18
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.188
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String