Home

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget : fix use-after-free in composite_dev_cleanup() 1. In func configfs_composite_bind() -> composite_os_desc_req_prepare(): if kmalloc fails, the pointer cdev->os_desc_req will be freed but not set to NULL. Then it will return a failure to the upper-level function. 2. in func configfs_composite_bind() -> composite_dev_cleanup(): it will checks whether cdev->os_desc_req is NULL. If it is not NULL, it will attempt to use it.This will lead to a use-after-free issue. BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0 Read of size 8 at addr 0000004827837a00 by task init/1 CPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1 kasan_report+0x188/0x1cc __asan_load8+0xb4/0xbc composite_dev_cleanup+0xf4/0x2c0 configfs_composite_bind+0x210/0x7ac udc_bind_to_driver+0xb4/0x1ec usb_gadget_probe_driver+0xec/0x21c gadget_dev_desc_UDC_store+0x264/0x27c

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before dba96dfa5a0f685b959dd28a52ac8dab0b805204
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before 2db29235e900a084a656dea7e0939b0abb7bb897
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before 8afb22aa063f706f3343707cdfb8cda4d021dd33
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before e624bf26127645a2f7821e73fdf6dc64bad07835
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before aada327a9f8028c573636fa60c0abc80fb8135c9
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before 5f06ee9f9a3665d43133f125c17e5258a13f3963
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before e1be1f380c82a69f80c68c96a7cfe8759fb30355
affected

37a3a533429ef9b3cc9f15a656c19623f0e88df7 before 151c0aa896c47a4459e07fee7d4843f44c1bb18e
affected

Default status
affected

3.16
affected

Any version before 3.16
unaffected

5.4.297
unaffected

5.10.241
unaffected

5.15.190
unaffected

6.1.148
unaffected

6.6.102
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/dba96dfa5a0f685b959dd28a52ac8dab0b805204

git.kernel.org/...c/2db29235e900a084a656dea7e0939b0abb7bb897

git.kernel.org/...c/8afb22aa063f706f3343707cdfb8cda4d021dd33

git.kernel.org/...c/e624bf26127645a2f7821e73fdf6dc64bad07835

git.kernel.org/...c/aada327a9f8028c573636fa60c0abc80fb8135c9

git.kernel.org/...c/5f06ee9f9a3665d43133f125c17e5258a13f3963

git.kernel.org/...c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba

git.kernel.org/...c/e1be1f380c82a69f80c68c96a7cfe8759fb30355

git.kernel.org/...c/151c0aa896c47a4459e07fee7d4843f44c1bb18e

cve.org (CVE-2025-38555)

nvd.nist.gov (CVE-2025-38555)

Download JSON