CVE-2025-40093
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_ecm: Refactor bind path to use __free()
After an bind/unbind cycle, the ecm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request.
Refactor the error handling in the bind path to use the __free() automatic cleanup mechanism.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In Linux kernel's USB gadget f_ecm driver, a NULL pointer dereference occurs during bind/unbind cycles due to stale notify_req.
Vulnerability
The vulnerability resides in the Linux kernel's USB gadget f_ecm driver. During a bind/unbind cycle, the ecm->notify_req pointer is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request [1].
Exploitation
Exploitation requires local access to trigger USB gadget bind/unbind cycles. An attacker with the ability to manipulate USB gadget configuration, such as via sysfs or certain user-space interactions, can cause the system to crash [1][2].
Impact
The impact is a denial of service (system crash) due to the NULL pointer dereference. There is no indication of privilege escalation or data corruption.
Mitigation
The fix refactors the error handling in the bind path to use the __free() automatic cleanup mechanism, preventing the use-after-free condition. Patches have been applied to the Linux kernel stable branches as seen in references [1] and [2]. Users are advised to update to the latest kernel versions.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
5d3745aaef191070f341d86cf15b9faf53ba84630c68bade842988380ac67Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- git.kernel.org/stable/c/070f341d86cf2c098d63e484a86c7c1d2696a868nvd
- git.kernel.org/stable/c/15b9faf53ba8719700596e7ef78879ce200e8c2envd
- git.kernel.org/stable/c/42988380ac67c76bb9dff8f77d7ef3eefd50b7b5nvd
- git.kernel.org/stable/c/4630c68bade82f087eaaab22e9a361da2f18d139nvd
- git.kernel.org/stable/c/d3745aaef19198d0c81637a7dd50ef53c4f879b7nvd
News mentions
0No linked articles in our index yet.