CVE-2025-38497
usb: gadget: configfs: Fix OOB read on empty string write
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage'
sysfs attributes, the store functions attempt to access page[l - 1]
before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning
of os_desc_qw_sign_store() and webusb_landingPage_store() to handle
the zero-length input case gracefully by returning immediately.
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: configfs: Corrección de lectura OOB en escritura de cadena vacía. Al escribir una cadena vacía en los atributos sysfs 'qw_sign' o 'landingPage', las funciones de almacenamiento intentan acceder a page[l - 1] antes de validar que la longitud 'l' sea mayor que cero. Este parche corrige la vulnerabilidad añadiendo una comprobación al inicio de os_desc_qw_sign_store() y webusb_landingPage_store() para gestionar correctamente la entrada de longitud cero, retornando inmediatamente.
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.
Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain processors. This flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this to expose sensitive information from the host OS. Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-07-28 CVE Published
- 2026-01-02 CVE Updated
- 2026-01-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (9)
| URL | Tag | Source |
|---|---|---|
| https://git.kernel.org/stable/c/87213d388e927aaa88b21d5ff7e1f75ca2288da1 | Vuln. Introduced |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 5.4.297 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 5.4.297" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 5.10.241 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 5.10.241" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 5.15.190 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 5.15.190" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 6.1.147 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 6.1.147" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 6.6.100 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 6.6.100" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 6.12.40 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 6.12.40" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 6.15.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 6.15.8" | en |
Affected
| ||||||
| Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.16 < 6.16 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.16 < 6.16" | en |
Affected
| ||||||
