CVE-2025-38448

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38448
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38448.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38448
Downstream
Related
Published
2025-07-25T16:15:30Z
Modified
2025-08-30T18:00:21Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Fix race condition in TTY wakeup

A race condition occurs when gsstartio() calls either gsstartrx() or gsstarttx(), as those functions briefly drop the portlock for usbepqueue(). This allows gsclose() and gserialdisconnect() to clear port.tty and portusb, respectively.

Use the null-safe TTY Port helper function to wake up TTY.

Example CPU1: CPU2: gserialconnect() // lock gsclose() // await lock gsstartrx() // unlock usbepqueue() gsclose() // lock, reset port.tty and unlock gsstartrx() // lock ttywakeup() // NPE

References

Affected packages