CVE-2025-38497
usb: gadget: configfs: Fix OOB read on empty string write
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 28, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 78b41148cfea2a3f04d87adf3a71b21735820a37 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 15a87206879951712915c03c8952a73d6a74721e 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 2798111f8e504ac747cce911226135d50b8de468 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 58bdd5160184645771553ea732da5c2887fc9bd1 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 783ea37b237a9b524f1e5ca018ea17d772ee0ea0 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 22b7897c289cc25d99c603f5144096142a30d897 87213d388e927aaa88b21d5ff7e1f75ca2288da1 < 3014168731b7930300aab656085af784edc861f6
Linux / Linux
3.16
References
git.kernel.org: https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37 git.kernel.org: https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76 git.kernel.org: https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e git.kernel.org: https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468 git.kernel.org: https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1 git.kernel.org: https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0 git.kernel.org: https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897 git.kernel.org: https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html