๐Ÿ” CVE Alert

CVE-2025-38555

UNKNOWN 0.0

usb: gadget : fix use-after-free in composite_dev_cleanup()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: gadget : fix use-after-free in composite_dev_cleanup() 1. In func configfs_composite_bind() -> composite_os_desc_req_prepare(): if kmalloc fails, the pointer cdev->os_desc_req will be freed but not set to NULL. Then it will return a failure to the upper-level function. 2. in func configfs_composite_bind() -> composite_dev_cleanup(): it will checks whether cdev->os_desc_req is NULL. If it is not NULL, it will attempt to use it.This will lead to a use-after-free issue. BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0 Read of size 8 at addr 0000004827837a00 by task init/1 CPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1 kasan_report+0x188/0x1cc __asan_load8+0xb4/0xbc composite_dev_cleanup+0xf4/0x2c0 configfs_composite_bind+0x210/0x7ac udc_bind_to_driver+0xb4/0x1ec usb_gadget_probe_driver+0xec/0x21c gadget_dev_desc_UDC_store+0x264/0x27c

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Aug 19, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
37a3a533429ef9b3cc9f15a656c19623f0e88df7 < dba96dfa5a0f685b959dd28a52ac8dab0b805204 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < 2db29235e900a084a656dea7e0939b0abb7bb897 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < 8afb22aa063f706f3343707cdfb8cda4d021dd33 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < e624bf26127645a2f7821e73fdf6dc64bad07835 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < aada327a9f8028c573636fa60c0abc80fb8135c9 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < 5f06ee9f9a3665d43133f125c17e5258a13f3963 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < e1be1f380c82a69f80c68c96a7cfe8759fb30355 37a3a533429ef9b3cc9f15a656c19623f0e88df7 < 151c0aa896c47a4459e07fee7d4843f44c1bb18e
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204 git.kernel.org: https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897 git.kernel.org: https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33 git.kernel.org: https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835 git.kernel.org: https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9 git.kernel.org: https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963 git.kernel.org: https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba git.kernel.org: https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355 git.kernel.org: https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html