Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2025-38448— usb: gadget: u_serial: Fix race condition in TTY wakeup

AI Predicted 5.5 Difficulty: Moderate EPSS 0.05% · P16

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinux35f95fd7f234d2b58803bab6f6ebd6bb988050a2< 18d58a467ccf011078352d91b4d6a0108c7318e8affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< d43657b59f36e88289a6066f15bc9a80df5014ebaffected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< a5012673d49788f16bb4e375b002d7743eb642d9affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< ee8d688e2ba558f3bb8ac225113740be5f335417affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< c6eb4a05af3d0ba3bc4e8159287722fb9abc6359affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< abf3620cba68e0e51e5c21054ce4f925f75b3661affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< c8c80a3a35c2e3488409de2d5376ef7e662a2bf5affected
35f95fd7f234d2b58803bab6f6ebd6bb988050a2< c529c3730bd09115684644e26bf01ecbd7e2c2c9affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-38448

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
usb: gadget: u_serial: Fix race condition in TTY wakeup
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_serial: Fix race condition in TTY wakeup A race condition occurs when gs_start_io() calls either gs_start_rx() or gs_start_tx(), as those functions briefly drop the port_lock for usb_ep_queue(). This allows gs_close() and gserial_disconnect() to clear port.tty and port_usb, respectively. Use the null-safe TTY Port helper function to wake up TTY. Example CPU1: CPU2: gserial_connect() // lock gs_close() // await lock gs_start_rx() // unlock usb_ep_queue() gs_close() // lock, reset port.tty and unlock gs_start_rx() // lock tty_wakeup() // NPE
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于TTY唤醒路径中的竞争条件问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 35f95fd7f234d2b58803bab6f6ebd6bb988050a2 ~ 18d58a467ccf011078352d91b4d6a0108c7318e8 -
LinuxLinux 3.5 -

II. Public POCs for CVE-2025-38448

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-38448

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-07-25 · 114 CVEs total

CVE-2025-38424perf: Fix sample vs do_exit()
CVE-2025-38438ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.
CVE-2025-38437ksmbd: fix potential use-after-free in oplock/lease break ack
CVE-2025-38436drm/scheduler: signal scheduled fence when kill job
CVE-2025-38435riscv: vector: Fix context save/restore with xtheadvector
CVE-2025-38434Revert "riscv: Define TASK_SIZE_MAX for __access_ok()"
CVE-2025-38433riscv: fix runtime constant support for nommu kernels
CVE-2025-38432net: netpoll: Initialize UDP checksum field before checksumming
CVE-2025-38431smb: client: fix regression with native SMB symlinks
CVE-2025-38430nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
CVE-2025-38429bus: mhi: ep: Update read pointer only after buffer is written
CVE-2025-38428Input: ims-pcu - check record size in ims_pcu_flash_firmware()
CVE-2025-38427video: screen_info: Relocate framebuffers behind PCI bridges
CVE-2025-38425i2c: tegra: check msg length in SMBUS block read
CVE-2025-38426drm/amdgpu: Add basic validation for RAS header
CVE-2025-38413virtio-net: xsk: rx: fix the frame's length check
CVE-2025-38416NFC: nci: uart: Set tty->disc_data only in success path
CVE-2025-38415Squashfs: check return result of sb_min_blocksize
CVE-2025-38414wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850
CVE-2025-38417ice: fix eswitch code memory leak in reset scenario

Showing top 20 of 114 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38448

No comments yet


Leave a comment