Логотип exploitDog
bind:CVE-2025-40093
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-40093

Количество 5

Количество 5

ubuntu логотип

CVE-2025-40093

11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

EPSS: Низкий
nvd логотип

CVE-2025-40093

11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

EPSS: Низкий
msrc логотип

CVE-2025-40093

11 дней назад

usb: gadget: f_ecm: Refactor bind path to use __free()

EPSS: Низкий
debian логотип

CVE-2025-40093

11 дней назад

In the Linux kernel, the following vulnerability has been resolved: u ...

EPSS: Низкий
github логотип

GHSA-7jm9-29fh-9vrx

11 дней назад

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-40093

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

0%
Низкий
11 дней назад
nvd логотип
CVE-2025-40093

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

0%
Низкий
11 дней назад
msrc логотип
CVE-2025-40093

usb: gadget: f_ecm: Refactor bind path to use __free()

0%
Низкий
11 дней назад
debian логотип
CVE-2025-40093

In the Linux kernel, the following vulnerability has been resolved: u ...

0%
Низкий
11 дней назад
github логотип
GHSA-7jm9-29fh-9vrx

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ecm: Refactor bind path to use __free() After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.

0%
Низкий
11 дней назад

Уязвимостей на страницу