CVE-2025-38497
Published: July 29, 2025Last modified: July 29, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: configfs: Fix OOB read on empty string write When writing an empty string to either 'qw_sign' or 'landingPage' sysfs attributes, the store functions attempt to access page[l - 1] before validating that the length 'l' is greater than zero. This patch fixes the vulnerability by adding a check at the beginning of os_desc_qw_sign_store() and webusb_landingPage_store() to handle the zero-length input case gracefully by returning immediately.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.147-r0) |
Stream | linux-lts | Fixed (6.6.100-r0) |
References
- https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897
- https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468
- https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6
- https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1
- https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0