Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38497
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-28 Jul, 2025 | 11:22
Updated At-02 Jan, 2026 | 15:30
Rejected At-
▼CVE Numbering Authority (CNA)
usb: gadget: configfs: Fix OOB read on empty string write

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/usb/gadget/configfs.c
Default Status
unaffected
Versions
Affected
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 78b41148cfea2a3f04d87adf3a71b21735820a37 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 15a87206879951712915c03c8952a73d6a74721e (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 2798111f8e504ac747cce911226135d50b8de468 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 58bdd5160184645771553ea732da5c2887fc9bd1 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 783ea37b237a9b524f1e5ca018ea17d772ee0ea0 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 22b7897c289cc25d99c603f5144096142a30d897 (git)
  • From 87213d388e927aaa88b21d5ff7e1f75ca2288da1 before 3014168731b7930300aab656085af784edc861f6 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/usb/gadget/configfs.c
Default Status
affected
Versions
Affected
  • 3.16
Unaffected
  • From 0 before 3.16 (semver)
  • From 5.4.297 through 5.4.* (semver)
  • From 5.10.241 through 5.10.* (semver)
  • From 5.15.190 through 5.15.* (semver)
  • From 6.1.147 through 6.1.* (semver)
  • From 6.6.100 through 6.6.* (semver)
  • From 6.12.40 through 6.12.* (semver)
  • From 6.15.8 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37
N/A
https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76
N/A
https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e
N/A
https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468
N/A
https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1
N/A
https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0
N/A
https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897
N/A
https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6
N/A
Hyperlink: https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
Resource: N/A
Details not found