CVE-2025-38497

high

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.

References

https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0

https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1

https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6

https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468

https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897

Details

Source: Mitre, NVD

Published: 2025-07-28

Updated: 2025-07-29

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00018