Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-40093

Опубликовано: 31 окт. 2025
Источник: msrc
CVSS3: 7.1
EPSS Низкий

Описание

usb: gadget: f_ecm: Refactor bind path to use __free()

EPSS

Процентиль: 5%
0.00024
Низкий

7.1 High

CVSS3

Связанные уязвимости

ubuntu
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

nvd
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

debian
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: u ...

github
11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

EPSS

Процентиль: 5%
0.00024
Низкий

7.1 High

CVSS3