Home

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix epfile null pointer access after ep enable. A race condition occurs when ffs_func_eps_enable() runs concurrently with ffs_data_reset(). The ffs_data_clear() called in ffs_data_reset() sets ffs->epfiles to NULL before resetting ffs->eps_count to 0, leading to a NULL pointer dereference when accessing epfile->ep in ffs_func_eps_enable() after successful usb_ep_enable(). The ffs->epfiles pointer is set to NULL in both ffs_data_clear() and ffs_data_close() functions, and its modification is protected by the spinlock ffs->eps_lock. And the whole ffs_func_eps_enable() function is also protected by ffs->eps_lock. Thus, add NULL pointer handling for ffs->epfiles in the ffs_func_eps_enable() function to fix issues

PUBLISHED Reserved 2025-04-16 | Published 2025-12-08 | Updated 2025-12-08 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b00d2572c16e8e59e979960d3383c2ae9cebd195
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 1c0dbd240be3f87cac321b14e17979b7e9cb6a8f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9ec40fba7357df2d36f4c2e2f3b9b1a4fba0a272
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before c53e90563bc148e4e0ad09fe130ba2246d426ea6
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before fc1141a530dfc91f0ee19b7f422a2d24829584bc
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d62b808d5c68a931ad0849a00a5e3be3dd7e0019
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 30880e9df27332403dd638a82c27921134b3630b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before cfd6f1a7b42f62523c96d9703ef32b0dbc495ba4
affected

Default status
affected

5.4.302 (semver)
unaffected

5.10.247 (semver)
unaffected

5.15.197 (semver)
unaffected

6.1.159 (semver)
unaffected

6.6.117 (semver)
unaffected

6.12.58 (semver)
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/b00d2572c16e8e59e979960d3383c2ae9cebd195

git.kernel.org/...c/1c0dbd240be3f87cac321b14e17979b7e9cb6a8f

git.kernel.org/...c/9ec40fba7357df2d36f4c2e2f3b9b1a4fba0a272

git.kernel.org/...c/c53e90563bc148e4e0ad09fe130ba2246d426ea6

git.kernel.org/...c/fc1141a530dfc91f0ee19b7f422a2d24829584bc

git.kernel.org/...c/d62b808d5c68a931ad0849a00a5e3be3dd7e0019

git.kernel.org/...c/30880e9df27332403dd638a82c27921134b3630b

git.kernel.org/...c/cfd6f1a7b42f62523c96d9703ef32b0dbc495ba4

cve.org (CVE-2025-40315)

nvd.nist.gov (CVE-2025-40315)

Download JSON