CVE-2025-38555
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
19/08/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget : fix use-after-free in composite_dev_cleanup()<br />
<br />
1. In func configfs_composite_bind() -> composite_os_desc_req_prepare():<br />
if kmalloc fails, the pointer cdev->os_desc_req will be freed but not<br />
set to NULL. Then it will return a failure to the upper-level function.<br />
2. in func configfs_composite_bind() -> composite_dev_cleanup():<br />
it will checks whether cdev->os_desc_req is NULL. If it is not NULL, it<br />
will attempt to use it.This will lead to a use-after-free issue.<br />
<br />
BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0<br />
Read of size 8 at addr 0000004827837a00 by task init/1<br />
<br />
CPU: 10 PID: 1 Comm: init Tainted: G O 5.10.97-oh #1<br />
kasan_report+0x188/0x1cc<br />
__asan_load8+0xb4/0xbc<br />
composite_dev_cleanup+0xf4/0x2c0<br />
configfs_composite_bind+0x210/0x7ac<br />
udc_bind_to_driver+0xb4/0x1ec<br />
usb_gadget_probe_driver+0xec/0x21c<br />
gadget_dev_desc_UDC_store+0x264/0x27c
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e
- https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897
- https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963
- https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33
- https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9
- https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba
- https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204
- https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355
- https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



