๐Ÿ” CVE Alert

CVE-2025-38497

UNKNOWN 0.0

usb: gadget: configfs: Fix OOB read on empty string write

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 28, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 78b41148cfea2a3f04d87adf3a71b21735820a37 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 15a87206879951712915c03c8952a73d6a74721e 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 2798111f8e504ac747cce911226135d50b8de468 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 58bdd5160184645771553ea732da5c2887fc9bd1 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 783ea37b237a9b524f1e5ca018ea17d772ee0ea0 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 22b7897c289cc25d99c603f5144096142a30d897 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 3014168731b7930300aab656085af784edc861f6
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37 git.kernel.org: https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76 git.kernel.org: https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e git.kernel.org: https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468 git.kernel.org: https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1 git.kernel.org: https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0 git.kernel.org: https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897 git.kernel.org: https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html