CVE-2025-38680
media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes. This can lead to an out-of-bounds read if the buffer has exactly 3 bytes. Fix it by checking that the buffer has at least 4 bytes in uvc_parse_format().
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 4, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
c0efd232929c2cd87238de2cccdaf4e845be5b0c < 9ad554217c9b945031c73df4e8176a475e2dea57 c0efd232929c2cd87238de2cccdaf4e845be5b0c < 1e269581b3aa5962fdc52757ab40da286168c087 c0efd232929c2cd87238de2cccdaf4e845be5b0c < 8343f3fe0b755925f83d60b05e92bf4396879758 c0efd232929c2cd87238de2cccdaf4e845be5b0c < ffdd82182953df643aa63d999b6f1653d0c93778 c0efd232929c2cd87238de2cccdaf4e845be5b0c < a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9 c0efd232929c2cd87238de2cccdaf4e845be5b0c < cac702a439050df65272c49184aef7975fe3eff2 c0efd232929c2cd87238de2cccdaf4e845be5b0c < 424980d33b3f816485513e538610168b03fab9f1 c0efd232929c2cd87238de2cccdaf4e845be5b0c < 6d4a7c0b296162354b6fc759a1475b9d57ddfaa6 c0efd232929c2cd87238de2cccdaf4e845be5b0c < 782b6a718651eda3478b1824b37a8b3185d2740c
Linux / Linux
2.6.26
References
git.kernel.org: https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57 git.kernel.org: https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087 git.kernel.org: https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758 git.kernel.org: https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778 git.kernel.org: https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9 git.kernel.org: https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2 git.kernel.org: https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1 git.kernel.org: https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6 git.kernel.org: https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html