CVE-2025-40314

Published: Dic 08, 2025 Last Modified: Dic 08, 2025
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget

In the __cdnsp_gadget_init() and cdnsp_gadget_exit() functions, the gadget
structure (pdev->gadget) was freed before its endpoints.
The endpoints are linked via the ep_list in the gadget structure.
Freeing the gadget first leaves dangling pointers in the endpoint list.
When the endpoints are subsequently freed, this results in a use-after-free.

Fix:
By separating the usb_del_gadget_udc() operation into distinct 'del' and
'put' steps, cdnsp_gadget_free_endpoints() can be executed prior to the
final release of the gadget structure with usb_put_gadget().

A patch similar to bb9c74a5bd14('usb: dwc3: gadget: Free gadget structure
only after freeing endpoints').

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0001
Percentile
0,0th
Updated

EPSS Score Trend (Last 2 Days)

https://git.kernel.org/stable/c/0cf9a50af91fbdac3849f8d950e883a3eaa3ecea
https://git.kernel.org/stable/c/37158ce6ba964b62d1e3eebd11f03c6900a52dd1
https://git.kernel.org/stable/c/87c5ff5615dc0a37167e8faf3adeeddc6f1344a3
https://git.kernel.org/stable/c/9c52f01429c377a2d32cafc977465f37b5384f77
https://git.kernel.org/stable/c/ea37884097a0931abb8e11e40eacfb25e9fdb5e9
https://git.kernel.org/stable/c/fdf573c517627a96f5040f988e9b21267806be5c