๐Ÿ” CVE Alert

CVE-2025-39760

UNKNOWN 0.0

usb: core: config: Prevent OOB read in SS endpoint companion parsing

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 5c3097ede7835d3caf6543eb70ff689af4550cd2 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 058ad2b722812708fe90567875704ae36563e33b 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < b10e0f868067c6f25bbfabdcf3e1e6432c24ca55 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 5badd56c711e2c8371d1670f9bd486697575423c 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 9512510cee7d1becdb0e9413fdd3ab783e4e30ee 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 4fe6f472f0beef4281e6f03bc38a910a33be663f 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < 9843bcb187cb933861f7805022e6873905f669e4 842f16905dfc6743c1dd80c3d29b49ba3ab7f7c8 < cf16f408364efd8a68f39011a3b073c83a03612d
Linux / Linux
2.6.35

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2 git.kernel.org: https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b git.kernel.org: https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55 git.kernel.org: https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c git.kernel.org: https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee git.kernel.org: https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f git.kernel.org: https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4 git.kernel.org: https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html